Biblio

Export 21376 results:
1996
Wang, Shiuh-Jeng, and Jin-Fu Chang. "Smart Card Based Secure Password Authentication Scheme." Computers & Security 15, no. 3 (1996): 231-237.
Tagarev, Todor, Petya Ivanova, and Alfredo Moscardini. Soft - Computing Methods for Early Warning of Violent Conflicts In 1996 AFCEA-Europe Sofia Seminar. Sofia, Bulgaria, 1996.
S.Nwana, Hyacinth. "Software agents: An overview." Knowledge Engineering Review 11, no. 3 (1996): 205-224.
Goldreich, Oded, and Rafail Ostrovsky. "Software Protection and Simulation on Oblivious RAMs." Journal of the ACM 43, no. 3 (1996): 431-473.
Buzan, Barry. "Sovereignty." In The Concise Oxford Dictionary of Politics, edited by Iain McLean, 464. Oxford and New York: Oxford University Press, 1996.
A.O., Freier, Karlton P., and Kocher P.C.. SSL Protocol Version 3.0 Internet Draft. IETF, 1996.
Jilkov, Vesselin, Donka Angelova, and Tzvetan Semerdjiev. State Estimation of a Nonlinear Dynamic System by Parallel Algorithms In EUROMECH'96 ., 1996.
Angelova, Donka, Tzvetan Semerdjiev, and Vesselin Jilkov. State estimation of a nonlinear dynamic system by parallel algorithm In 2nd EUropean Nonlinear Oscilation Conference EUROMECH. Prague, 1996.
State of Emergency Act., 1996.
Holsti, Kalevi J.. The State, War, and the State of War. Cambridge: Cambridge University Press, 1996.
Thomson, John L., and Bill Richardson. "Strategic and Competitive Success: Towards a Model of the Comprehensively Competent Organization." Management Decision 34, no. 2 (1996): 5-19.
Molander, Roger C., Peter A. Wilson, and Andrew Riddile. Strategic Information Warfare: A New Face of War . Santa Monica: RAND, 1996.
Watanabe, Chihiro. Sustainable Development By Substituting Technology For Energy And Environment Constraints. Japan’s View, Institute for New Technologies, 1996.
Muschovitch, Zak. Taxation of Internet Commerce., 1996.
Enders, Walter, and Todd Sandler. "Terrorism and Foreign Direct Investment in Spain and Greece." Kyklos 49, no. 3 (1996): 331-352.
Kharchenko, Vyacheslav S.. Theoretic Foundation of Fault-Tolerant Computer Systems with Multi-Version Redundancy. Kiev: Ministry of Defence, 1996.
McAdam, Doug, Sidney Tarrow, and Charles Tilly. "To Map Contentious Politics." Mobilization 1, no. 1 (1996): 17-34.
Ben’, A.. "Today a bribe-taker, tomorrow an agent? (Сьогодні хабарник, завтра агент?)." Golos Ukrainy (1996): 7.
Fleck, John. "TOPAZ Research Funds at Risk." Albuquerque Journal (1996).
Linz, Juan J., and Alfred Stepan. "Toward Consolidated Democracy." Journal of Democracy (1996).
Angelova, Donka, Vesselin Jilkov, and Tzvetan Semerdjiev. "Tracking Maneuvering Target by Interacting Multiple model." Comtes rendus de l’Academie bulgare des Sciences 49 (1996): 37-40.
"Trafficking in Women in European Union: Characteristics, Trends and Politics." In European Conference on Trafficking in Women., 1996.
Mileham, Patrick, and Keith Spacie. Transforming Corporate Leadership. London: Financial, 1996.
Stańczyk, Jerzy. Understanding Contemporary Security., 1996.
Alberts, David. The Unintended Consequences of Information Age Technologies . Washington D.C.: NDU Press, 1996.

Pages