Biblio

Export 21359 results:
2000
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
Hutchins, Edwin. Distribution Cognition. San Diego: University of California Press, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Doctrine of National Security of the Russian Federation - 2000., 2000.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).
Mendelsohn, J.. Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
Patrone, David M., and Tony Nardo. A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Chemeris, I.. "A dossier for voting (Досьє для голосування)." Den’ (2000): 4.
Christoskov, Ludmil. "Earthquakes – Hazard and Contrameasures." 62 (2000).
Dang, A.V.. E-Business raises transaction security concerns . Gartner Advisory, 2000.
Levitt, Steven D., and Sudhir Alladi Venkatesh. "An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
Wright, Jerry W., and Laura Drake. Economic and Political Impediments to Middle East Peace: Critical Questions and Alternative Scenarios. New York: Palgrave Macmillian, 2000.
Sandler, Todd, and Walter Enders. "An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
Lee, W.-B., and C.-Y. Chang. Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Hirt, Martin, and Kazue Sako. Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
Sun, Hung-Min. "An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
Nachev, Atanas. "Electromagnetic Radiation and the Computer Systems Data Security Problem." Information & Security: An International Journal 4 (2000): 105-109.
E. Perle, Gabriel, Mark A. Fischer, and John Taylor Williams. "Electronic Publishing and Software." Computer Law (2000).
Emergency Preparedness Act., 2000.
Currie, David. "EMU: Threats and Opportunities for Companies and National Economies." In The Impact of the Euro. London: Palgrave Macmillan, 2000.
Ralston, Anthony, David Hemmendinger, and Edwin D. Reilly. Encyclopedia of Computer Science. John Wiley & Sons, 2000.
Smith, Karen. "The End of Civilian Power EU: A Welcome Demise or Cause for Concern?" The International Spectator 35, no. 2 (2000): 11-28.
Ebel, Robert, and Rajan Menon. Energy and Conflict in Central Asia and the Caucasus. Lanham: Rowman and Littlefield Publishers, 2000.
Grigorov, Vladimir. "Engagement of the Ministry of Defense and Bulgarian Armed Forces in Establishing Information Society." Information & Security: An International Journal 5 (2000): 75-85.

Pages