Biblio
Export 21404 results:
Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
"The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
A Secure Data Hiding Scheme for Two-Color Images." In IEEE Symposium on Computers and Communications., 2000.
"A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
"Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
"Security Aspects of the Cellular Communications." Information & Security: An International Journal 4 (2000): 73-94.
"Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.
"Selling America to the Highest Bidder." Economist (2000): 79.
Semantic Attacks: The Third Wave of Network Attacks." Crypto-Gram (2000).
"Shared Rivers and Interstate Conflict." Political Geography 19, no. 8 (2000): 971-96.
"Should We Privatize the Peacekeeping." Washington Post (2000).
"Significance of Accountability under the New Approach to Public Governance." International Review of Administrative Sciences 66, no. 4 (2000): 599-618.
" Single Database Private Information Retrieval Implies Oblivious Transfer In Advances in Cryptology: EUROCRYPT’00: International Conference on the Theory and Application of Cryptographic Techniques . Vol. 1807. Bruges, Belgium, 2000.
Small firms must take Internet plunge or risk being sidelined." The Engineer 10 (2000): 10.
"Social and Ecological Resilience: Are They Related?" Progress in Human Geography 24, no. 3 (2000): 347-364.
"Software Engineering: A Programming Approach. Vol. 3. Addison-Wesley, 2000.
Solo for an entrepreneur accompanied by controlling and criminal structures (Соло для підприємця в супроводі контрольних та кримінальних структур)." Uriadovyi kur’er (2000): 4.
" Standing Before the Portals. Non-Profit Content Online in the Age of Commercial Gatekeepers In Shaping the Network Society: The Future of the Public Sphere in Cyberspace (DIAC2000). Seattle, U.S., 2000.