Biblio
Export 21400 results:
Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
"Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.
Pulpit Diplomacy: A Critical Assessment of the Axworthy Doctrine." International Journal 53 (1998): 379-406.
"A qualitative discriminant approach for generating In IEEE Transactions on Knowledge and Data Engineering. 2nd ed. Vol. 10., 1998.
Reading the Public Opinion: How Political Actors View The Democratic Process. Chicago: University of Chicago Press, 1998.
The Real Politik of the Information Age." Information Strategy (1998).
"Rebuilding the European Defence Industry in a Competitive World: Intergovernmentalism and the Leading Role Played by Companies." In Restructuring the Global Military Sector: The End of Military Fordism, 225-27. Vol. II. London: Pinter, 1998.
"Reengineering Defense Planning in Bulgaria In Research Report. Sofia: Institute for International and Security Studies, 1998.
Reengineering the Defense Planning in Bulgaria In Research Report. Sofia: Institute for Security and International Studies, 1998.
Reengineering the Defense Planning in Bulgaria In ISIS Reports. Sofia: Institute for Security and International Studies, 1998.
Regional Security and the Future of Central Asia. Westport, CT: Praeger, 1998.
Regulation on the functions, tasks and organization of the work of the Security Council to the Council of Ministers. State Gazette 116 (7 October 1998), last amendment State Gazette 81 (30 September 2014), 1998.
Reinventing Diplomacy in the Information Age . Washington, DC: Center for Strategic and International Studies, 1998.
Relationship Between Trauma Narratives and Trauma Pathology." Journal of Traumatic Stress 11, no. 2 (1998): 385-392.
"Relationship Stages: An Inductive Analysis Identifying Cognitive, Affective, and Behavioral Dimensions of Knapp’s Relational Stages Model." Communication Research Reports 15, no. 3 (1998): 280.
" Requirements for Access Control: US Healthcare Domain In 3rd ACM Workshop on Role-Based Access Control. Vol. 43. Fairfax, Virginia, USA, 1998.
Res 1199/1988. UNSC, 1998.
Res 1203/1998. UNSC, 1998.
Resolution 1199. UN Security Council, 1998.
Resolution 1203. UN Security Council, 1998.