Biblio
Export 21461 results:
Drug Policy and the Public Good. Oxford: Oxford University Press, 2010.
On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010).
"The Dynamics of Russia’s Response to the Piracy Threat." Connections: The Quarterly Journal 9, no. 3 (2010): 21-46.
"Eastern Europe Unites over Energy." International Herald Tribune (2010): 15.
"Economic Analysis “Cost/Benefit” in Defense and Security. Sofia: Stopanstvo, 2010.
An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq. Santa Monica, CA: RAND, 2010.
Effective Resource Management in a Good Governance Context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Efficient Cancellable Biometric Key Generation Scheme for Cryptography." International Journal of Network Security 11, no. 2 (2010): 61-69.
"An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010.
"Elected in 100 milliseconds: Appearance-Based Trait Inferences and Voting." Journal of Nonverbal Behavior 34, no. 2 (2010): 83-110.
"Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects." Information & Security: An International Journal 25 (2010): 99-112.
"Emergency-Departments Simulation in Support of Service-Engineering: Staffing, Design, and Real-Time Tracking In Senate of the Technion. Vol. Doctor of Philosophy. Haifa: Israel Institute of Technology Shvat, 2010.
Emerging patterns in the reconstruction of conflict-affected countries." Disasters 34, no. Supplement s1 (2010): S1-S14.
"En värld – två alternative." Svenska Dagbladet (2010).
"Enabling Factors and Effects of Corruption in the Defense Sector." Connections: The Quarterly Journal 9, no. 3 (2010): 77-88.
"E-Net Models of a Software System for E-Mail Security In Computer Science, Cryptography and Security., 2010.
E-Net Models of a Software System for Web Pages Security In Computer Science, Cryptography and Security., 2010.
Engaging Hamas: Rethinking the Quartet Principles. European Institute for Security Studies, 2010.
"Engaging Oceania." Naval War College Review (2010).
Enhance ECDSA to Identity-based Proxy Signature Scheme." Journal of Information Assurance and Security (JIAS) 5 (2010).
"The Enhanced Method and Informational Technology to Support the Func-tional Safety of the Aircrafts Onboard Information-Control Systems on Their Design Stage." Science and Technology of the Air Force 2 (2010).
"The Enhanced Method of the Functional Safety of the Aircraft Onboard Information-Control Systems Analysis and Estimation." Systems of Arms and Military Equipment 2 (2010): 136-42.
"