Biblio
Export 21441 results:
Compression-compatible Fragile and Semi-Fragile Tamper Detection." In SPIE EI Photonics West 2000., 2000.
"The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
"Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
"Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
The concept of corruption (Поняття корупції)." In Korruptsiia i bor’ba s nei (Corruption and the battle with it), 218-19. Moscow, 2000.
"The Concept of Security Sector Reform In Brief 15: Security Sector Reform . Bonn, Germany: Bonn International Center for Conversion, 2000.
Concurrent Oblivious Transfer In 41st Annual IEEE Symposium on Foundations of Computer Science FOCS 2000 . Redondo Beach, California, USA: IEEE Computer Society Press, 2000.
Conflict Prevention and Conflict Resolution: The Limits to Multilateralism In International Review of the Red Cross., 2000.
Confronting Corruption: The Elements of a National Integrity System." In TI Source Book . Berlin: Transparency International, 2000.
"Confronting Corruption: The Elements of a National Integrity System. Vol. 1. Berlin: Transparency International, 2000.
The Conscription of Asian Sex Slaves: Causes and Effects of U.S. Military Sex Colonialism in Thailand and the Call to Expand U.S. Asylum Law." Asian Law Journal 7 (2000): 103-150.
"The Construct of Resilience: A Critical Evaluation and Guidelines for Future Work." Child Development 71, no. 3 (2000): 543-562.
"Contagion." The Review of Economic Studies 67, no. 1 (2000): 57-78.
"Contemporary Trends in the Development of Information Security and Computer Virology." Information & Security: An International Journal 4 (2000): 60-72.
"Control System for Computers Functionality and Network on Basis of Using Neural Nets." Neural Computers: Development and Application 1 (2000).
"Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.
Core competencies – koncepcja strategiczna." Przegląd Organizacji 16, no. 3 (2000): 15-20.
"Costs of Oil Dependence: A 2000 Update. Oak Ridge, TN: Oak Ridge National Laboratory, 2000.
Countdown to a Very Personal War." Financial Times (2000).
"Coup d’oeil: The Commander’s Intuition in Clausewitzian Terms." Air & Space Power Journal (2000).
"Crisis of Confidence: NATO’s Balkan Adventure Brought Europe to the Threshold of a New Cold War." In European Union, Russia and the Baltic Situation. Moscow: Interdiktat, 2000.
"Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 992-993.
"Cryptographic Software Solution for Information Protection in a Corporate Intranet." Information & Security: An International Journal 4 (2000): 97-104.
"A Culture of Corruption? Coping with Government in Post-Communist Europe. Budapest: Central European University Press, 2000.