Biblio
Export 21402 results:
Understanding Credit Card Frauds." Cards Business Review (2003).
"Understanding Formal Methods. Springer, 2003.
Understanding International Conflicts. Vol. 4th ed. New York: Longman, 2003.
Understanding Terrorism in America: From the Klan to Al Qaeda. New York: Routledge, 2003.
Understanding the European Union’s External Relations, ECPR Studies in European Political Science. London: Routledge, 2003.
Understanding the Model Driven Architecture (MDA)." Methods & Tools 11, no. 3 (2003): 17-24.
"Unilateralismus der USA als Problem der internationalen Politik." Aus Politik und Zeitgeschichte 15 (2003): 17-18.
"University in Kosovo has American Accent." International Herald Tribune (2003).
"Unmanned Aerial Vehicles: Background and Issues for Congress. Washington, D.C.: Congressional Research Service, Library of Congress, 2003.
An Untraceable Blind Signature Scheme." IEICE Transactions on Foundations 7 (2003): 1902-1906.
"Update in the War on Terror In President’s Address to the Nation., 2003.
US e-Government Authentication Framework and Programs." IT Professional 5, no. 3 (2003): 16-21.
"U.S. Expands Plan for Cargo Inspections at Foreign Ports." New York Times (2003).
"US Navy mine warfare vision… programmes…operation: key to sea power in the 21st century." Naval Forces 37 (2003).
"U.S., North Korea Drifting Toward War." Washington Post (2003).
"U.S. Policy Toward the Caspian and Black Sea Region." Connections: The Quarterly Journal 2, no. 1 (2003): 15-22.
"US to confront Brussels over defence policy." Financial Times (2003).
"A User Friendly Remote Authentication Scheme with Smart Cards." Computers & Security 22, no. 6 (2003): 547-550.
"The U.S.-European Capabilities Gap and the Prospects for ESDP." In Defending Europe: The EU, NATO and The Quest for European Autonomy, 86-93. New York: Palgrave-MacMillan, 2003.
"U.S.-Ukrainian Relations Will not Revive under Kuchma." Kyiv Post (2003).
"Viewpoint Democratic Transition Theory Meets the ‘English School’." Connections: The Quarterly Journal 2, no. 2 (2003): 91-109.
"Violence Against Women. Zagreb: Ženska infoteka, 2003.
Visible Encryption: Using Paper as a Secure Channel In Security and Watermarking of Multimedia Contents V, Proceedings of SPIE. Vol. 5020., 2003.
A Visual Tool to Simplify the Building of Distributed Simulations Using HLA." Information & Security: An International Journal 12, no. 2 (2003): 151-163.
"Volunteer Impact Initiative., 2003.