Biblio

Export 21403 results:
1995
Wu, Tzong-Chen. "Remote Login Authentication Scheme Based on a Geometric Approach." Computer Communications 18, no. 2 (1995): 959-963.
Report of the WEU Assembly on European Cooperation in the Mediterranean. Paris, 1995.
Report of the World Summit for Social Development In UN Document. Copenhagen : United Nations, 1995.
Resolution of the Government of the Czech Republic of 21 December 1995 In Military Strategy of the Czech Republic., 1995.
Tchamova, Albena. "Resolving Conflict Assignment in Attributes Data Association Systems." Comptes rendus de l'Academie Bulgare des Sciences 48 (1995): 57-60.
Revised UNMIH Training Schedule In Battle Command Training Program. BCTP archives, 1995.
Kirkpatrick, David. "The Rising Unit Cost of Defence Equipment–The Reasons and The Results." Defence and Peace Economics 6 (1995): 263-88.
Vagg, Jon. "Rough Seas? Contemporary Piracy in South East Asia." British Journal of Criminology 35, no. 1 (1995): 63-80.
Zagorski, Andrej. "Rußland und die OSZE—Erwartungen und Enttäuschungen." In OSZE-Jahrbuch 1995, 112. Baden-Baden: Nomos, 1995.
Baranovsky, V.G.. "Russian Foreign Policy Priorities and Euro-Atlantic Multilateral Institutions." The International Spectator 30, no. 1 (1995).
Thirunavukkarasu, Chelliah, James Mayfield, and Tim Finin. Secret agents - a security architecture for the KQML agent communication language In ACM CIKM Intelligent Information Agents Workshop. New York: Association of Computing Machinery, 1995.
Sawyer, N., and C. Monckton. "‘Shoe-fit’ - A Computerised Shoe Print Database." In European Convention on Security and Detection, 86-89. Brighton, UK, 1995.
Bracken, Paul. "The Significance of DBK." In Dominant Battlespace Awareness, edited by Stuart Johnson and Martin Libicki. Washington, DC: NDU Press, 1995.
Haller, N.. The S/KEY One-Time Password System. Bellcore, 1995.
Senesen, Gulay Gunluk. "Some Economic Aspects of Turkish Armaments Spending." New Perspectives on Turkey 13 (1995): 75-91.
Weiss, Thomas G., and Jarat Choppa. "Sovereignty under Siege: From Intervention to Humanitarian Space." In Beyond Westphalia? State Sovereignty and International Intervention. Baltimore: Johns Hopkins University Press, 1995.
de Secondat, Charles, and Baron de Montesquieu. The Spirit of Laws. Cambridge University Press, 1995.
Donaldson, Thomas, and Lee E. Preston. "Stakeholder Theory of the Corporation: Concepts, Evidence and Implications." The Academy of Management Review 20, no. 1 (1995): 65-91.
Chilcoat, Richard. Strategic Art: The New Discipline for 21st Century Leaders. Carlisle, PA: U.S. Army War College, 1995.
Study on Enlargement. Brussels: NATO Office of Information and Press, 1995.
Mankins, John C.. Technology Readiness Levels: A White Paper. NASA, Office of Space Access and Technology, 1995.
Szafranski, Richard. "A Theory of Information Warfare. Preparing for 2020." Airpower Journal 9, no. 1 (1995): 56-65.
Johnston, Alistair Iain. "Thinking about Strategic Culture." International Security 19, no. 4 (1995): 37-39.
Merton, Robert. "The Thomas Theorem and the Matthew Effect?" Social Forces 74, no. 2 (1995): 380.
Geifman, Anna. Thou Shalt Kill: Revolutionary Terrorism in Russia, 1894–1917. Princeton, NJ: Princeton University Press, 1995.

Pages