Biblio
Export 21441 results:
DHS Scraps Computer Pre-Screening System, Starts Over." Government Executive Online (2004).
"Diplomacy." In Attacking Terrorism: Elements of a Grand Strategy, 97-114. Washington, D.C.: Georgetown University Press, 2004.
"Dirty Bomb: Weapons of Mass Disruption. New York: Chamberlain Bros, 2004.
Discriminating between elderly and young using a fractal dimension analysis of centre of pressure." Int J Med Sci 1, no. 1 (2004): 11-20.
"Distinctive Image Features from Scale-Invariant Keypoints." International Journal of Computer Vision 60, no. 2 (2004): 91-110.
"Diversanty Unichtozhayut Dagestanskih Militsionerov (Saboteurs Destroy Dagestani Policemen)." Gazeta (2004).
"DOD’s Ongoing Efforts to Implement Capabilities-Based Planning In Monterey Strategy Seminar on Capabilities-Based Defense Planning: Building a 21st Century Force . Monterey, CA: Center for Contemporary Conflict and the Cebrowski Institute for Information Innovation and Superiority, 2004.
Does Europe Exist as an Entity for Military Cooperation? Evolving Russian Perspectives, 1991–2004." Connections: The Quarterly Journal 3, no. 2 (2004): 47-62.
"Does Iraq Matter?" The National Interest 75 (2004).
"Dollars for Democracy?: U.S. Aid to Ukraine Challenged." The New York Times (2004).
"Don’t Dismiss China’s Daqing Oil Pipeline." Asia Times Online (2004).
"Draining Terror’s Financial Swamps. The Middle East Forum, 2004.
A Dynamic ID-based Remote User Authentication Scheme." IEEE Transactions on Consumer Electronics 50, no. 2 (2004).
"Effects-Based Operations: A Guide for Practitioners In presented to the 9th International Command and Control Research and Technlogy Symposium. Copenhagen, 2004.
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters." IEEE Transactions on Computers 53, no. 2 (2004): 232-240.
"Efficient access control and key management schemes for mobile agents." Computer Standards & Interfaces 26, no. 5 (2004): 423-433.
"An Efficient and Practical Remote User Authentication Scheme." Information & Security: An International Journal 15, no. 1 (2004): 75-88.
"E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 5-6.
"E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 1 (2004): 117-127.
"E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 2 (2004): 231-255.
"EKS: Open-source Web-based Distributed Learning Tool." Information & Security: An International Journal 14 (2004): 87-99.
"Elaborating Security Requirements by Construction of Intentional Anti-Models In Proceedings of the 26th International Conference on Software Engineering, ICSE 2004., 2004.
The e-Language Learning Project: Conceptualizing a Web-based Language Learning System In A White Paper . East Lansing, MI: College of Education, Michigan State University, 2004.
Elements of Defense Transformation. Washington, DC, 2004.