Biblio
Export 21400 results:
Conclusion: Toward an Effective Grand Strategy." In Attacking Terrorism: Elements of a Grand Strategy, 293. Washington, D.C.: Georgetown University Press, 2004.
"Confronting the Truth. United States Institute for Peace, 2004.
Constitutionalism as Protector or Disrupter of Nationalism:A Selected Central, Eastern European and Eurasian Review." Connections: The Quarterly Journal 3, no. 4 (2004): 43-52.
"Containing Kosovo." Connections: The Quarterly Journal 3, no. 4 (2004): 21-33.
"Contemporary Challenges to the Implementation of International Humanitarian Law." Connections: The Quarterly Journal 3, no. 3 (2004): 99-113.
"Context-Adaptive Mobile Visualization and Information Management." In IEEE Visualization 2004. Austin, TX, USA, USA , 2004.
"The Convention, the IGC and the Great Powers. The ESDP and the New Security Threats." In The Politics of European Security, 55-82. Copenhagen: Danish Institute of Inter¬national Affairs, 2004.
"Cosmopolitan Democracy and its Critics: A Review." European Journal of International Relations 10 (2004): 437-473.
"Cosmopolitical Realism: On the Distinction Between Cosmopolitanism in Philosophy and the Social Sciences." Global Networks 4, no. 2 (2004): 131-156.
""Council Directive 2004/67/EC concerning measures to safeguard security of natural gas supply." Official Journal L 127 (2004): 0092-0096.
Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford: CT: McGraw-Hill, 2004.
"Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford, CT: McGraw-Hill, 2004.
"Crisis For Export." Rodnaya Gazeta 48 (2004).
"Crisis Management in a Transitional Society: the Latvian Experience. Elanders Gotab AB: Vällingby, 2004.
The Crisis of Islam . New York: Random House, 2004.
The Critical but Perilous Caucasus." Orbis 48, no. 1 (2004): 105-16.
"Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." Information & Security: An International Journal 15, no. 1 (2004): 110-114.
"Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by Feng Bao, Robert H. Deng and Jianying Zhou. Singapore: Computer Science 2947, 2004.
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol." In Computer Security – ESORICS 2004. Berlin, Germany, 2004.
"A Cultural Approach to the Southern Mediterranean Crisis." Connections: The Quarterly Journal 3, no. 2 (2004): 93-98.
"A Cultural Critique of Psychological Explanations of Terrorism." Cross-Cultural Psychology Bulletin 38 (2004).
"Current Solutions for Web Service Composition." IEEE Internet Computing 8, no. 6 (2004): 51-59.
"Current Status & Future Perspective of PKI Development in Taiwan In paper presented at the International Conference of Collaboration of e-Commerce Applications and Security. Taipei, Taiwan, 2004.