Works matching United States. National Security Agency/Central Security Service
1
- International Journal of Information Technology & Decision Making, 2015, v. 14, n. 5, p. 971, doi. 10.1142/S0219622015500200
- Mokhtari, Hadi;
- Salmasnia, Ali
- Article
2
- Journal of Library Administration, 2007, v. 46, n. 1, p. 27, doi. 10.1300/J111v46n01_03
- Article
3
- George Washington Law Review, 2017, v. 85, n. 3, p. 800
- Article
4
- Health Matrix: Journal of Law-Medicine, 1999, v. 9, n. 2, p. 253
- Article
5
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 6, p. 10
- Article
6
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 2, p. 47, doi. 10.1080/00963402.2000.11456943
- Article
7
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 3, p. 8
- Article
8
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 2, p. 9
- Article
9
- Bulletin of the Atomic Scientists, 1998, v. 54, n. 6, p. 7
- Article
10
- Bulletin of the Atomic Scientists, 1995, v. 51, n. 6, p. 7
- Article
11
- SMU Law Review, 2015, v. 68, n. 2, p. 427
- Article
12
- Sciences, 1981, v. 21, n. 6, p. 8
- Article
13
- Nature, 2006, v. 439, n. 7077, p. 633, doi. 10.1038/439633b
- Article
14
- Texas Law Review, 2010, v. 88, n. 7, p. 1855
- Article
15
- Stanford Law Review, 2008, v. 60, n. 4, p. 1023
- Katyal, Neal;
- Caplan, Richard
- Article
16
- Journal of Common Market Studies, 2016, v. 54, n. 4, p. 896, doi. 10.1111/jcms.12345
- Article
18
- Bulletin of the Atomic Scientists, 1990, v. 46, n. 8, p. 5
- Article
19
- Bulletin of the Atomic Scientists, 1982, v. 38, n. 3, p. 3, doi. 10.1080/00963402.1982.11455705
- Article
20
- Radical Teacher, 2014, v. 99, p. 83, doi. 10.5195/rt.2014.85
- Article
22
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 139
- Article
23
- Vanderbilt Journal of Transnational Law, 2014, v. 47, n. 4, p. 1167
- Article
24
- Journal of Cancer Research & Therapeutics, 2017, v. 13, p. S48
- Nobuteru Kubo;
- Takuma Nomiya;
- Hiroshi Tsuji
- Article
25
- Journal of Public Affairs (14723891), 2017, v. 17, n. 3, p. n/a, doi. 10.1002/pa.1659
- Article
26
- Harvard Journal of Law & Public Policy, 2015, v. 38, n. 1, p. 117
- Article
28
- International Policy Digest, 2015, v. 2, n. 6, p. 22
- Article
29
- International Journal of Intelligence & Counterintelligence, 2010, v. 23, n. 4, p. 680, doi. 10.1080/08850601003780987
- Article
30
- International Journal of Intelligence & Counterintelligence, 2009, v. 22, n. 4, p. 699, doi. 10.1080/08850600903143320
- Article
31
- International Journal of Intelligence & Counterintelligence, 2005, v. 18, n. 2, p. 354, doi. 10.1080/08850600590884810
- Article
32
- International Journal of Intelligence & Counterintelligence, 2004, v. 17, n. 3, p. 449, doi. 10.1080/08850600490446835
- Article
33
- Homeland Security Review, 2009, v. 3, n. 2, p. 125
- Article
34
- Harvard International Law Journal, 2015, v. 56, n. 1, p. 81
- Article
35
- Cryptologia, 2011, v. 35, n. 2, p. 110, doi. 10.1080/01611194.2011.558980
- Article
38
- Cryptologia, 2009, v. 33, n. 3, p. 246, doi. 10.1080/01611190802653228
- Kim, Jongsung;
- Phan, Raphael C. -W.
- Article
39
- Cryptologia, 2008, v. 32, n. 1, p. 56, doi. 10.1080/01611190701752915
- Article
40
- CounterPunch, 2013, v. 20, n. 8, p. 14
- Article
41
- Minnesota Law Review, 2013, v. 98, n. 1, p. 62
- Gray, David;
- Citron, Danielle
- Article
42
- Microwave Journal, 2009, v. 52, n. 10, p. 43
- Article
43
- New England Law Review, 2013, v. 48, n. 1, p. 55
- Article
44
- Intelligence & National Security, 2014, v. 29, n. 6, p. 793, doi. 10.1080/02684527.2014.946242
- Johnson, Loch K.;
- Aldrich, Richard J.;
- Moran, Christopher;
- Barrett, David M.;
- Hastedt, Glenn;
- Jervis, Robert;
- Krieger, Wolfgang;
- McDermott, Rose;
- Omand, David;
- Phythian, Mark;
- Wark, Wesley K.
- Article
45
- Intelligence & National Security, 2010, v. 25, n. 5, p. 611, doi. 10.1080/02684527.2010.537119
- Article
46
- Intelligence & National Security, 2008, v. 23, n. 4, p. 488, doi. 10.1080/02684520802293098
- Article
47
- Intelligence & National Security, 2006, v. 21, n. 6, p. 980, doi. 10.1080/02684520601046317
- Article
48
- Intelligence & National Security, 2003, v. 18, n. 4, p. 72, doi. 10.1080/02684520310001688880
- Article
49
- Intelligence & National Security, 2001, v. 16, n. 1, p. 27, doi. 10.1080/02684520412331306200a
- Article
50
- Intelligence & National Security, 2000, v. 15, n. 3, p. 1, doi. 10.1080/02684520008432615
- Article