Biblio
Export 21401 results:
An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010.
"Elected in 100 milliseconds: Appearance-Based Trait Inferences and Voting." Journal of Nonverbal Behavior 34, no. 2 (2010): 83-110.
"Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects." Information & Security: An International Journal 25 (2010): 99-112.
"Emergency-Departments Simulation in Support of Service-Engineering: Staffing, Design, and Real-Time Tracking In Senate of the Technion. Vol. Doctor of Philosophy. Haifa: Israel Institute of Technology Shvat, 2010.
Emerging patterns in the reconstruction of conflict-affected countries." Disasters 34, no. Supplement s1 (2010): S1-S14.
"En värld – två alternative." Svenska Dagbladet (2010).
"Enabling Factors and Effects of Corruption in the Defense Sector." Connections: The Quarterly Journal 9, no. 3 (2010): 77-88.
"E-Net Models of a Software System for E-Mail Security In Computer Science, Cryptography and Security., 2010.
E-Net Models of a Software System for Web Pages Security In Computer Science, Cryptography and Security., 2010.
Engaging Hamas: Rethinking the Quartet Principles. European Institute for Security Studies, 2010.
"Engaging Oceania." Naval War College Review (2010).
Enhance ECDSA to Identity-based Proxy Signature Scheme." Journal of Information Assurance and Security (JIAS) 5 (2010).
"The Enhanced Method and Informational Technology to Support the Func-tional Safety of the Aircrafts Onboard Information-Control Systems on Their Design Stage." Science and Technology of the Air Force 2 (2010).
"The Enhanced Method of the Functional Safety of the Aircraft Onboard Information-Control Systems Analysis and Estimation." Systems of Arms and Military Equipment 2 (2010): 136-42.
"Enhanced public safety and intelligence: smarter analytics. IBM Emerging Technologies, 2010.
Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support through Interdisciplinary Education. Monterey, California: Naval Postgraduate School, 2010.
The Enigma of Lone Wolf Terrorism: An Assessment." Studies in Conflict in Terrorism 33, no. 9 (2010): 854-70.
"Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data." In Information Resources Management: Concepts, Methodologies, Tools and Applications, 693-710. IGI Global, 2010.
"Equal Opportunity Counterinsurgency: The Importance of Afghan Women in U.S. Counterinsurgency Operations In Faculty of the U.S. Army Command and General Staff College. Vol. Master of Military Art and Science., 2010.
Escalating Rivalries and Diverging Interests: Prospects for Stability and Security in the Black Sea Region." Southeast European and Black Sea Studies 10 (2010): 287-302, 296.
"Establishment of a C4ISR Integration Fund. NC3A, 2010.
The Estimation and Supporting Methods of the Functional Safety of the Aircraft Onboard control & Information System." Radio-Electronic and Computer Systems (2010): 278-82.
"Estonian Rescue Act, 2010 In consolidated text as of 1 January 2012., 2010.
Ethnic Competition, Radical Islam, and Challenges to Stability in the Republic of Dagestan." Communist & Post-Communist Studies 43 (2010): 297-308.
"