Found 16219 results
Problems of security and maintenance of life cycle of information systems." Military Journal 58, no. 6 (1996): 83-90."
Profiling Organised Crime: The Current State of the Art In Report NSCR. Leiden: Netherlands Institute for the Study of Criminality and Law Enforcement (NISCALE), 1996.
Protecting Publicly-Available Images with a Visible Image Watermark In SPIE International Conference on Electronic Imaging, Science and Technology: Optical Security and Counterfeit Deterrence Techniques. San Jose, CA, 1996.
Proxy Signatures: Delegation of the Power to Sign Messages." IEICE Transactions on Fundamentals (1996): 1338-1354."
Proxy Signatures for Delegating Signing Operation In 3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
Prussian Military Reforms 1786-1813 . New York: AMS Press, Inc, 1996.
A Reference Framework for Certification Authorities/Trusted Third Parties In 13th IFIP International Information Security Conference., 1996.
Resolution 1077 (1996). Strasbourg: Council of Europe, 1996.
Revolution and War. Ithaca, NY: Cornell University Press, 1996.
The Road to Oslo. Institute Blizhneva Vostoka, 1996.
On Rocky Foundations: NATO, the UN and Peace Operations in the Post Cold War Era. Bradford, Bradford University, 1996.
Scaling, Self Similarity and Intermediate Asymptotics In Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
Secure Coprocessing Applications and Research Issues In Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
Security in Computer Systems In Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
Security in Computer Systems In AFSEA-Sofia Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia:, 1996.
Security Problems of Small Nations." In Small States and the Security in the New Europe. London: Brassey’s, 1996."
Shall We Dust Moscow." Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections (1996)."
Smart Card Based Secure Password Authentication Scheme." Computers & Security 15, no. 3 (1996): 231-237."
Soft - Computing Methods for Early Warning of Violent Conflicts In 1996 AFCEA-Europe Sofia Seminar. Sofia, Bulgaria, 1996.
Software agents: An overview." Knowledge Engineering Review 11, no. 3 (1996): 205-224."
Software Protection and Simulation on Oblivious RAMs." Journal of the ACM 43, no. 3 (1996): 431-473."
Sovereignty." In The Concise Oxford Dictionary of Politics, edited by Iain McLean, 464. Oxford and New York: Oxford University Press, 1996."
SSL Protocol Version 3.0 Internet Draft. IETF, 1996.
State estimation of a nonlinear dynamic system by parallel algorithm In 2nd EUropean Nonlinear Oscilation Conference EUROMECH. Prague, 1996.