Biblio
Export 21441 results:
Human Nature in Politics: The Dialogue of Psychology with Political Science." The American Political Science Review 79, no. 2 (1985).
"La professione militare in Italia . Milan, Franco Angeli, 1985.
Languages and designs for probability." Cognitive Science 9 (1985): 309-339.
"Leadership and performance beyond expectations. New York: Free Press, 1985.
Military Intervention in Democratic Societies. London: Croom Helm, 1985.
Military strategy and tactics computer modeling of land war problems . Plenum Press, 1985.
Normy moralne - próba systematyzacji. Warsaw: Wyd. PWN, 1985.
An Organizational Approach to the Analysis of Political Terrorism." Orbis 29, no. 3 (1985).
""Pak-Afghan Drug Trade." Herald magazine (Pakistan) (1985): 945-963.
The Paris Minimum Standards of Human Rights Norms in a State of Emergency." American Journal of International Law 79 (1985): 1072-1081.
"Phenomenology: A Preferred Approach to Research in Information Systems in Research Methods." In Information Systems, 193-201. Amsterdam: North Holland, 1985.
"Political Parties in the Republic of Ireland. Manchester: Manchester University Press, 1985.
The Politics of International Economic Relations. London: John Allen & Unwin, 1985.
A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on Information Theory 31, no. 4 (1985): 469-472.
"A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms." IEEE Transactions on Information Theory IT 31, no. 4 (1985): 469-472.
"A Randomized Protocol for Signing Contracts." A Randomized Protocol for Signing Contracts 28, no. 6 (1985): 637-647.
"A Robust and Verifiable Cryptographically Secure Election Scheme In 26th IEEE Symposium on Foundations of Computer Science (FOCS), Portland, OR. New York, USA: IEEE Computer Society, 1985.
Scenario Techniques. New York, NY: McGraw Hill, 1985.
The Soldier and the State: The Theory and Politics of Civil-Military Relations. Cambridge, MA: Harvard University Press, 1985.
Soviet Active Measures and Disinformation: Overview and Assessment." Parameters, Journal of the US Army War College 15, no. 4 (1985): 19.
"Speech to the American Bar Association In Margaret Thatcher Foundation., 1985.
Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985.
Virtual Time." ACM Transactions on Programming Languages and Systems 7, no. 3 (1985): 404-425.
"Wörterbuch der Psychologie . Leipzig: Veb Bibliographisches Institut, 1985.
The 2 sigma problem: The search for methods of group instruction as effective as one-to-one tutoring." Educational Researcher 4 (1984): 4-16.
"