Skip navigation

putin IS MURDERER

Browsing by Subject Security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 2 of 2
PreviewIssue DateTitleAuthor(s)PreviewTypeIssue DateTitleAuthor(s)
23-Dec-2017The dogmata of secrecy: are we realistic about the facts and impact of massive leaks of classified information?C. N. J. de VeyMestdagh; Kamphorst, A.; Noordhoek, J. H.; Mulder, T.; H. T. van der Waaij; Law&ICT and European and International Law at the University of Groningen, the NetherlandsConference Abstract23-Dec-2017The dogmata of secrecy: are we realistic about the facts and impact of massive leaks of classified information?C. N. J. de VeyMestdagh; Kamphorst, A.; Noordhoek, J. H.; Mulder, T.; H. T. van der Waaij
2012The forming of trust level to the nodes in the distributed computer systemsMukhin, Vadym; Bidkov, Anton; Thinh, Vu DucArticle2012The forming of trust level to the nodes in the distributed computer systemsMukhin, Vadym; Bidkov, Anton; Thinh, Vu Duc