Biblio

Export 21363 results:
1999
Smith, Gordon. "Reinventing Diplomacy: A Virtual Necessity." Virtual Diplomacy Series (1999).
Sun, Hung-Min, and B.-T. Hsieh. Remark on Two Nonrepudiable Proxy Signature Schemes In 9th National Conference on Information Security. Taiwan, 1999.
Remarks by the President at the Close of the Washington Summit. USIS Washington File, 1999.
Tan, Kaijun, and Hongwen Zhu. "Remote Password Authentication Scheme Based on Cross-Product." Computer Communications 22, no. 4 (1999): 390-393.
Gross, David. Report from the Fidelity Implementation Study Group In Spring Simulation Interoperability Workshop., 1999.
Carlsson, Ingvar, Han Sung-Joo, and M. Kupolati. Report of the Independent Inquiry into United Nations Actions during the 1994 Rwanda Genocide., 1999.
Report of the Secretary-General pursuant to General Assembly Resolution 53/35. New York: United Nations, Office of United Nations Secretary-General, 1999.
Resolution 1244 (1999). Security Council , 1999.
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies (1999).
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies 19 (1999).
Sapolsky, Harvey, and Eugene Gholz. "Restructuring the U.S. Defense Industry." International Security 24, no. 3 (1999): 5.
Tyshchenko, Iu., and V. Pikhovshek. Return of the Crimean Tartars: a Chronicle of Events (Повернення кримських татар: хроніка подій). Kyiv, 1999.
Van Creveld, Martin. The Rise and Decline of the State. Cambridge: Cambridge University Press, 1999.
Dyson, Kenneth, and Kevin Featherstone. The Road to Maastricht: Negotiating Economic and Monetary Union. Oxford: Oxford University Press, 1999.
Lakov, Dimitar, and Georgi Kirov. Routing of Computer Nets via Fuzzy Logic In Youth Science Session, Sofia, Bulgaria., 1999.
Russia 2000 Part 2: The Face of Russia to Come. Stratfor Global Intelligence, 1999.
Russian/ Kidnapping. GlobalSecurity.org, 1999.
Pavliatenko, Viktor N.. "Russian Security in the Pacific Asian Region. The Dangers of Isolation." In Russia and East Asia. The 21st Century Security Environment, edited by Gilbert Rozman, Mikhail G. Nosov and Koji Watanabe, 20. New York: M. E. Sharpe, East West Institute, 1999.
Belokrenitsky, Vyacheslav. "Russian–Afghan Relations." In Russia and Asia: The Emerging Security Agenda, 205. Stockholm: Stockholm International Peace Research Institute, 1999.
Bertrand, Gilles, Anna Michalski, and Lucio R. Pench. Scenarios Europe 2010 . EU Commission, 1999.
Scenarios Europe 2010 – Five Possible Futures For Europe. Brussels: European Commission, Forward Studies Unit, 1999.
Zhou, Jianying, and Kwok-Yan Lam. "Securing Digital Signatures for Non-Repudiation." Computer Communications 22, no. 8 (1999): 710-716.
Vukadinovic, Radovan. Security in the southeast of Europe [Sigurnost na jugoistoku Europe]. Zagreb: HUMS, 1999.
Jorge, P., J.G. Silva, and L.M. Silva. "Security mechanisms for using mobile agents in electronic commerce." 18th IEEE symposium on Reliable Distributed Systems (1999): 378-383.
Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer." Computer Communications 22, no. 3 (1999): 287-290.

Pages