Biblio

Export 8062 results:
1999
Smith, Gordon. "Reinventing Diplomacy: A Virtual Necessity." Virtual Diplomacy Series (1999).
Sun, Hung-Min, and B.-T. Hsieh. Remark on Two Nonrepudiable Proxy Signature Schemes In 9th National Conference on Information Security. Taiwan, 1999.
Remarks by the President at the Close of the Washington Summit. USIS Washington File, 1999.
Tan, Kaijun, and Hongwen Zhu. "Remote Password Authentication Scheme Based on Cross-Product." Computer Communications 22, no. 4 (1999): 390-393.
Gross, David. Report from the Fidelity Implementation Study Group In Spring Simulation Interoperability Workshop., 1999.
Carlsson, Ingvar, Han Sung-Joo, and M. Kupolati. Report of the Independent Inquiry into United Nations Actions during the 1994 Rwanda Genocide., 1999.
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies (1999).
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies 19 (1999).
Sapolsky, Harvey, and Eugene Gholz. "Restructuring the U.S. Defense Industry." International Security 24, no. 3 (1999): 5.
Van Creveld, Martin. The Rise and Decline of the State. Cambridge: Cambridge University Press, 1999.
Dyson, Kenneth, and Kevin Featherstone. The Road to Maastricht: Negotiating Economic and Monetary Union. Oxford: Oxford University Press, 1999.
Lakov, Dimitar, and Georgi Kirov. Routing of Computer Nets via Fuzzy Logic In Youth Science Session, Sofia, Bulgaria., 1999.
Pavliatenko, Viktor N.. "Russian Security in the Pacific Asian Region. The Dangers of Isolation." In Russia and East Asia. The 21st Century Security Environment, edited by Gilbert Rozman, Mikhail G. Nosov and Koji Watanabe, 20. New York: M. E. Sharpe, East West Institute, 1999.
Belokrenitsky, Vyacheslav. "Russian–Afghan Relations." In Russia and Asia: The Emerging Security Agenda, 205. Stockholm: Stockholm International Peace Research Institute, 1999.
Bertrand, Gilles, Anna Michalski, and Lucio R. Pench. Scenarios Europe 2010 . EU Commission, 1999.
Scenarios Europe 2010 – Five Possible Futures For Europe. Brussels: European Commission, Forward Studies Unit, 1999.
Zhou, Jianying, and Kwok-Yan Lam. "Securing Digital Signatures for Non-Repudiation." Computer Communications 22, no. 8 (1999): 710-716.
Vukadinovic, Radovan. Security in the southeast of Europe [Sigurnost na jugoistoku Europe]. Zagreb: HUMS, 1999.
Jorge, P., J.G. Silva, and L.M. Silva. "Security mechanisms for using mobile agents in electronic commerce." 18th IEEE symposium on Reliable Distributed Systems (1999): 378-383.
Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer." Computer Communications 22, no. 3 (1999): 287-290.
Barnett, Thomas P. M.. The Seven Deadly Sins of Network-Centric Warfare. U.S. Naval Institute , 1999.
Tursunov, Bakhrom, and Marina Pikulina. Severe Lessons of Batken In Conflict Studies Research Centre. Defence Academy of the United Kingdom, 1999.
Gigerenzer, Gerd, and Peter M. Todd. Simple Heuristics that Make Us Smart. New York: Oxford University Press, 1999.
Coakley, John. "Society and Political Culture." In Politics in the Republic of Ireland, 63. London: Routledge, 1999.
Maamar, Z., B. Moulin, and Y. Bédard. "Software agent-oriented frameworks for the interoperability of georeferenced digital libraries on the World Wide Web: The SIGAL project." In Interoperating Geographic Information Systems, 335-354. Boston: Kluwer Academic Publishers, 1999.

Страници