Biblio
Export 21441 results:
Identical Foundation of Probability Theory and Fuzzy Set Theory In 5th Intern. Conf. on Inf. Fusion. Annapolis, 2002.
An Identity Based Authentication Key Agreement Protocol Based on Pairing." Electronics Letters 38 (2002).
"An Identity of Strength: Personal Thoughts on Women in Afghanistan." Interna-tional Review of the Red Cross 847 (2002): 638.
"IJCAI-99 Workshop on Ontologies, Problem-Solving Methods: Lessons Learned, and Future Trends., 2002.
Illegal Weapons Traffic in Eastern Europe. Harrisonburg, VA: Nelson Institute for International and Public Affairs, James Madison University, 2002.
IMF Fiscal Transparency Homepage., 2002.
Implementing the Tate pairing." Algorithmic Number Theory, Lecture Note in Computer Science 2369 (2002).
"An Improved Version of a Multiple Target Tracking Algorithm." Information & Security: An International Journal 9 (2002): 130-140.
"Improvement on Peyravian-Zunic’s Password Authentication Schemes." IEICE Transactions on Communications E85-B, no. 4 (2002): 823-825.
"In Agenda: Multi-Polar and Complementary Defense Policy." Golos Armenii (2002).
"The Inexibility Trap: Frustrated Societies, Weak States and Democracy. Bratislava: United Nations Development Programme, 2002.
In memoriam." Information & Security: An International Journal 9 (2002): 177-179.
"In Need of Attention: The UN Register in its Seventh Year. Bradford Arms Register Studies, 2002.
In the Shade of Locarno. Why European Defence is Failing." International Affairs 78, no. 4 (2002).
"Incident Command: Tales from the Hot Seat . Aldershot: Ashgate Publishing Company, 2002.
Increasing risk of great floods in a changing climate." Nature 415 (2002): 514-517.
"Indonesia’s Military Business as Usual." Asia Times Online (2002).
"The Inflexibility Trap: Frustrated Societies, Weak States, and Democracy. Bratislava: UNDP, 2002.
Information Operations and Counterterrorism." Jane’s Intelligence Review 14, no. 9 (2002).
"Information Security Awareness: Baseline Education and Certification." Information Technology on the Move 8, no. 8 (2002): 1-12.
"Information Security Policies, Procedure and Standards Guidelines for Effective Information Security Management. Bosca Raton, Florida: Auerbach publication, 2002.
Information systems in support of wildland fire management decision making in Canada." Computers and Electronics in Agriculture 37:1, no. 3 (2002): 185-198.
"Information vs. knowledge: The role of intranets in knowledge management In Thirty-Fifth Annual Hawaii International Conference on System Sciences. IEEE Computer Society Press, 2002.
An Innovative Public-Private Partnership: New Approach to Development." World Development 30, no. 6 (2002): 991-1008.
"