Biblio

Export 21400 results:
2004
CHEN, Yi-Hui, and Eric Jui- Lin LU. "Design of a Secure Fine-Grained Official Document Exchange Model for E-Government." Information & Security: An International Journal 15 (2004): 55-71.
Wagner, Paul J., and Jason M. Wudi. Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course. SIGCSE'04, 2004.
González-Lloret, Marta. "Designing Task-Based Call to Promote Interaction: En Busca de Esmeraldas." Language Learning and Technology 7, no. 1 (2004): 86-104.
Zeidan, Sami. "Desperately Seeking Definition: The International Community’s Quest for Identifying the Specter of Terrorism." Cornell International Law Journal 36, no. 3 (2004): 491.
Bowen, Wyn Q.. "Deterrence and Asymmetry: Non-state Actors and Mass Casualty Terrorism." Contemporary Security Policy 25, no. 1 (2004): 54-70.
Gorbenko, Anatoly, Peter Popov, Alexander Romanovsky, Artem Boyarchuk, and Vyacheslav Kharchenko. "Development of Dependable Web Services out of Undependable Web Components." Technical Report CS-TR (Newcastle: School of Computing Science (2004).
Cenys, Antanas, Darius Rainys, Lukas Radvilavicius, and Andrej Bielko. "Development of Honeypot System Emulating Functions of Database Server." In RTO IST Symposium on “Adaptive Defence in Unclassified Networks”. Toulouse, France, 2004.
Smith, John. The Development of Response Forces in NATO and the EU and the Evolving NATO-EU Relationship. NATO Parliamentary Assembly, Committee Reports, 2004 Annual Session , 2004.
Strohm, Chris. "DHS Scraps Computer Pre-Screening System, Starts Over." Government Executive Online (2004).
Sheehan, Michael. "Diplomacy." In Attacking Terrorism: Elements of a Grand Strategy, 97-114. Washington, D.C.: Georgetown University Press, 2004.
King, Gilbert. Dirty Bomb: Weapons of Mass Disruption. New York: Chamberlain Bros, 2004.
Doyle, T., E. Dugan, B. Humphries, and R. U. Newton. "Discriminating between elderly and young using a fractal dimension analysis of centre of pressure." Int J Med Sci 1, no. 1 (2004): 11-20.
Lowe, David G.. "Distinctive Image Features from Scale-Invariant Keypoints." International Journal of Computer Vision 60, no. 2 (2004): 91-110.
Rasulov, Sergei. "Diversanty Unichtozhayut Dagestanskih Militsionerov (Saboteurs Destroy Dagestani Policemen)." Gazeta (2004).
Warner, Ted. DOD’s Ongoing Efforts to Implement Capabilities-Based Planning In Monterey Strategy Seminar on Capabilities-Based Defense Planning: Building a 21st Century Force . Monterey, CA: Center for Contemporary Conflict and the Cebrowski Institute for Information Innovation and Superiority, 2004.
Monaghan, Andrew. "Does Europe Exist as an Entity for Military Cooperation? Evolving Russian Perspectives, 1991–2004." Connections: The Quarterly Journal 3, no. 2 (2004): 47-62.
Abramowitz, Morton. "Does Iraq Matter?" The National Interest 75 (2004).
Brinkley, Joel. "Dollars for Democracy?: U.S. Aid to Ukraine Challenged." The New York Times (2004).
Katz, Mark. "Don’t Dismiss China’s Daqing Oil Pipeline." Asia Times Online (2004).
Farah, Douglas. Draining Terror’s Financial Swamps. The Middle East Forum, 2004.
Das, Manik Lal, Ashutosh Saxena, and V.P. Gulati. "A Dynamic ID-based Remote User Authentication Scheme." IEEE Transactions on Consumer Electronics 50, no. 2 (2004).
Duczinski, Guy. Effects-Based Operations: A Guide for Practitioners In presented to the 9th International Command and Control Research and Technlogy Symposium. Copenhagen, 2004.
Tzeng, Wen-Guey. "Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters." IEEE Transactions on Computers 53, no. 2 (2004): 232-240.
Lina, Iuon-Chang, Hsia-Hung Oub, and Min-Shiang Hwang. "Efficient access control and key management schemes for mobile agents." Computer Standards & Interfaces 26, no. 5 (2004): 423-433.
Chang, Ya-Fen, and Chin-Chen Chang. "An Efficient and Practical Remote User Authentication Scheme." Information & Security: An International Journal 15, no. 1 (2004): 75-88.

Pages