Biblio
Export 21400 results:
VELNET (Virtual Environment for Learning Networking). ACE2004, 2004.
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security In Applied Cryptography and Network Security: Second International Conference ACNS 2004 , Edited by Markus Jakobsson, Moti Yung and Jianying Zhou. Yellow Mountain, China: Computer Science 3089, 2004.
Viewpoint Central Asia: Mackinder Revisited?" Connections: The Quarterly Journal 3, no. 1 (2004): 95-105.
"Vladimir Putin and Central Asia. London: I. B. Tauris, 2004.
The Voting Practice of the Fifteen in the UN General Assembly: Convergence and Divergence In Working Paper . Observatori de Politica Exterior Europea , 2004.
Wandel der Weltordnung durch asymmetrische Kriege." In Asymmetrische Kriegsführung – ein neues Phänomen der Internationalen Politik?, 91. Baden-Baden: Nomos, 2004.
"The War After the War: Strategic Lessons of Iraq and Afghanistan. Washington, D.C.: CSIS Press, 2004.
War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics." Virginia Journal of Law & Technology 9, no. 7 (2004).
"Warriors and Civilization? The Education Of (Military) Leadership Personnel In A Postmodern World." Connections: The Quarterly Journal 3, no. 1 (2004): 67-73.
"Weapons un- der scrutiny: Implementing arms export controls and combating small arms proliferation in Bulgaria , Edited by Philip Gounev, Bernardo Mariani, Larry Attree and Emil Tsenkov. Sofia: Center for the Study of Democracy and Saferworld, 2004.
Weary Special Forces Quit for Security Jobs." The Daily Telegraph (2004).
"Web Services Architecture." W3C Working Group (2004).
"WebCT: A Major Shift of Emphasis In Technical Evolution Report. Athabasca University, 2004.
The Western Balkans: The Road to Europe In speech to the European Af-fairs Committee in Berlin., 2004.
Where is the Lone Ranger When We Need Him? America’s Role for a Post-conflict Stability Force. Washington D.C.: United States Institute of Peace Press, 2004.
White Ethnonationalist and Political Islamist Methods of Fund-raising and Propaganda on the Internet." In The Changing Face of Terrorism, ed. Rohan Gunaratna , 127. Singapore: Eastern Universities Press, 2004.
"White House memo criticized." USA Today (2004).
"Who Protects Cyberspace." George Mason University, Department of Economics, Global Prosperity Initiative, 2004.
"Why People Cheat., 2004.
Why Stock Markets Crash: Critical Events in Complex Financial Systems. Princeton: Princeton University Press, 2004.
Will we learn a lesson from the Ukrainian elections?" MSN Bishkek (2004).
"Wireless Honeypot Countermeasures. Broadcom, 2004.
WMD Proliferation and Transatlantic Relations: Is a Joint Western Strategy Possible?. Netherlands Institute of International Relations (Clingendael Institute), 2004.
A World Without Power." Foreign Policy 143 (2004): 32-39.
"