Biblio

Export 21423 results:
2004
Nguyen, Lan, Reihaneh Safavi-Naini, and Kaoru Kurosawa. Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security(link is external) In Applied Cryptography and Network Security: Second International Conference ACNS 2004 , Edited by Markus Jakobsson, Moti Yung and Jianying Zhou. Yellow Mountain, China: Computer Science 3089, 2004.
Hess, Michel. "Viewpoint Central Asia: Mackinder Revisited?" Connections: The Quarterly Journal 3, no. 1 (2004): 95-105.
Jonson, Lena. Vladimir Putin and Central Asia. London: I. B. Tauris, 2004.
Lock, Peter. Vom Wandel bewaffneter Konflikte. Kinder und Gewehre(link is external)., 2004.
Johansson-Nogués, Elisabeth. The Voting Practice of the Fifteen in the UN General Assembly: Convergence and Divergence(link is external) In Working Paper . Observatori de Politica Exterior Europea , 2004.
Münkler, Herfried. "Wandel der Weltordnung durch asymmetrische Kriege." In Asymmetrische Kriegsführung – ein neues Phänomen der Internationalen Politik?, 91. Baden-Baden: Nomos, 2004.
Cordesman, Anthony H.. The War After the War: Strategic Lessons of Iraq and Afghanistan. Washington, D.C.: CSIS Press, 2004.
Ryan, Patrick. "War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics(link is external)." Virginia Journal of Law & Technology 9, no. 7 (2004).
Micewski, Edwin R.. "Warriors and Civilization? The Education Of (Military) Leadership Personnel In A Postmodern World." Connections: The Quarterly Journal 3, no. 1 (2004): 67-73.
Weapons un- der scrutiny: Implementing arms export controls and combating small arms proliferation in Bulgaria (link is external), Edited by Philip Gounev, Bernardo Mariani, Larry Attree and Emil Tsenkov. Sofia: Center for the Study of Democracy and Saferworld, 2004.
Rennie, David, and Michael Smith. "Weary Special Forces Quit for Security Jobs(link is external)." The Daily Telegraph (2004).
Booth, David, Francis McCabe, Chris Ferris, David Orchard, Hugo Haas, Eric Newcomer, and Michael Champion. "Web Services Architecture(link is external)." W3C Working Group (2004).
Morningstar, Barbara, Jeremy Schubert, and Kristine Thibeault. WebCT: A Major Shift of Emphasis(link is external) In Technical Evolution Report. Athabasca University, 2004.
Patten, Christopher. The Western Balkans: The Road to Europe In speech to the European Af-fairs Committee in Berlin., 2004.
Perito, Robert. Where is the Lone Ranger When We Need Him? America’s Role for a Post-conflict Stability Force. Washington D.C.: United States Institute of Peace Press, 2004.
Gruen, Madeleine. "White Ethnonationalist and Political Islamist Methods of Fund-raising and Propaganda on the Internet(link is external)." In The Changing Face of Terrorism, ed. Rohan Gunaratna , 127. Singapore: Eastern Universities Press, 2004.
Biskupic, Joan. "White House memo criticized(link is external)." USA Today (2004).
Coyne, Christopher, and Peter Leeson. "Who Protects Cyberspace(link is external)." George Mason University, Department of Economics, Global Prosperity Initiative, 2004.
Kelman, Rabbi Jay. Why People Cheat(link is external)., 2004.
Sornette, Didier. Why Stock Markets Crash: Critical Events in Complex Financial Systems(link is external). Princeton: Princeton University Press, 2004.
Timirbayev, Vyacheslav. "Will we learn a lesson from the Ukrainian elections?(link is external)" MSN Bishkek (2004).
Oudot, Laurent. Wireless Honeypot Countermeasures(link is external). Broadcom, 2004.
Van Ham, Peter. WMD Proliferation and Transatlantic Relations: Is a Joint Western Strategy Possible?(link is external). Netherlands Institute of International Relations (Clingendael Institute), 2004.
Ferguson, Niall. "A World Without Power(link is external)." Foreign Policy 143 (2004): 32-39.
Weimann, Gabriel. www.terror.net – How Modern Terrorism Uses the Internet In Special Report. Washington, D.C.: United States Institute for Peace, 2004.

Pages