Export 17816 results:
Boland, R.. "Phenomenology: A Preferred Approach to Research in Information Systems in Research Methods." In Information Systems, 193-201. Amsterdam: North Holland, 1985.
Gallagher, Michael. Political Parties in the Republic of Ireland. Manchester: Manchester University Press, 1985.
Spero, JE.. The Politics of International Economic Relations. London: John Allen & Unwin, 1985.
ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on Information Theory 31, no. 4 (1985): 469-472.
ElGamal, Taher. "A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms." IEEE Transactions on Information Theory IT 31, no. 4 (1985): 469-472.
Even, Shimon, Oded Goldreich, and Abraham Lempel. "A Randomized Protocol for Signing Contracts." A Randomized Protocol for Signing Contracts 28, no. 6 (1985): 637-647.
Cohen, Josh D., and Michael J. Fischer. A Robust and Verifiable Cryptographically Secure Election Scheme In 26th IEEE Symposium on Foundations of Computer Science (FOCS), Portland, OR. New York, USA: IEEE Computer Society, 1985.
von Reibnitz, Ute Hélène. Scenario Techniques. New York, NY: McGraw Hill, 1985.
Huntington, Samuel P.. The Soldier and the State: The Theory and Politics of Civil-Military Relations. Cambridge, MA: Harvard University Press, 1985.
Kux, Dennis. "Soviet Active Measures and Disinformation: Overview and Assessment." Parameters, Journal of the US Army War College 15, no. 4 (1985): 19.
Margaret Thatcher Foundation. Speech to the American Bar Association In Margaret Thatcher Foundation., 1985.
Miller, Victor S.. Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985.
Jefferson, D.R.. "Virtual Time." ACM Transactions on Programming Languages and Systems 7, no. 3 (1985): 404-425.
Gunter, C., F. Klix, G. Vorwerg, Timpe K. H., J. Lompscher, and H. Kulka. Wörterbuch der Psychologie . Leipzig: Veb Bibliographisches Institut, 1985.