Biblio

Export 21401 results:
2000
Cottey, Andrew, Tim Edmunds, and Anthony Forster. The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Schneier, Bruce. Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
Chen, Yu-Yuan, Hsiang-Kuang Pan, and Yu-Chee Tseng. "A Secure Data Hiding Scheme for Two-Color Images." In IEEE Symposium on Computers and Communications., 2000.
Hwang, M.S., Eric J. L. Lu, and I.C. Lin. "A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
Gritzalis, Stefanos, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou, and Sokratis K. Katsikas. "Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
Popov, Metodi. "Security Aspects of the Cellular Communications." Information & Security: An International Journal 4 (2000): 73-94.
Trapans, Dr. Jan Arveds. Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Security Strategy of the Republic of Albania., 2000.
Hellman, Joel S., Geraint Jones, and Daniel Kaufmann. Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.
"Selling America to the Highest Bidder." Economist (2000): 79.
Schneier, Bruce. "Semantic Attacks: The Third Wave of Network Attacks." Crypto-Gram (2000).
Toset, Hans P. W., Nils P. Gleditsch, and Håvard Hegre. "Shared Rivers and Interstate Conflict." Political Geography 19, no. 8 (2000): 971-96.
Wohl, Jonah Schulhofer. "Should We Privatize the Peacekeeping." Washington Post (2000).
M. Haque, Shamsul. "Significance of Accountability under the New Approach to Public Governance." International Review of Administrative Sciences 66, no. 4 (2000): 599-618.
Watts, Duncan J.. A simple model of fads and cascading failures., 2000.
Di Crescenzo, Giovanni, Tal Malkin, and Rafail Ostrovsky. Single Database Private Information Retrieval Implies Oblivious Transfer In Advances in Cryptology: EUROCRYPT’00: International Conference on the Theory and Application of Cryptographic Techniques . Vol. 1807. Bruges, Belgium, 2000.
Lee, A.. "Small firms must take Internet plunge or risk being sidelined." The Engineer 10 (2000): 10.
Adger, Neil W.. "Social and Ecological Resilience: Are They Related?" Progress in Human Geography 24, no. 3 (2000): 347-364.
Bell, Douglas. Software Engineering: A Programming Approach. Vol. 3. Addison-Wesley, 2000.
Dolzhenko, G.. "Solo for an entrepreneur accompanied by controlling and criminal structures (Соло для підприємця в супроводі контрольних та кримінальних структур)." Uriadovyi kur’er (2000): 4.
Blair, T.. Speech to the Polish Stock Exchange on 6 October 2000., 2000.
Hargittai, Eszter. Standing Before the Portals. Non-Profit Content Online in the Age of Commercial Gatekeepers In Shaping the Network Society: The Future of the Public Sphere in Cyberspace (DIAC2000). Seattle, U.S., 2000.
Serabian, Jr., John A.. Statement for the Record before the Joint Economic Committee on Cyber Threats and the U.S. Economy ., 2000.
Obłój, K.. Strategia sukcesu firmy. Warsaw: PWE, 2000.
Strengthening Transatlantic Security: A U.S. Strategy for the 21st Century. Washington, DC: Department of Defense, 2000.

Pages