Works matching United States. National Security Agency
1
- Cryptologia, 1993, v. 17, n. 4, p. 403, doi. 10.1080/0161-119391868024
- Article
2
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 314, doi. 10.1049/iet-ifs.2016.0590
- Sadeghi, Sadegh;
- Bagheri, Nasour
- Article
3
- Harvard National Security Journal, 2022, v. 13, n. 2, p. 224
- Kostyuk, Nadiya;
- Landau, Susan
- Article
4
- ISSA Journal, 2019, v. 17, n. 6, p. 7
- Article
5
- ISSA Journal, 2018, v. 16, n. 1, p. 7
- Article
6
- ISSA Journal, 2017, v. 15, n. 11, p. 5
- Article
7
- ISSA Journal, 2016, v. 14, n. 2, p. 11
- Article
8
- Public Manager, 2012, p. 53
- Zasloff, Mindy;
- Okurowski, Mary Ellen
- Article
9
- Juniata Voices, 2015, v. 15, p. 49
- Article
10
- Harvard Law & Policy Review, 2016, v. 10, n. 1, p. 255
- Article
11
- Harvard Law & Policy Review, 2014, v. 8, n. 2, p. 281
- Article
13
- Washington University Journal of Law & Policy, 2015, v. 47, p. 217
- Article
14
- Washington University Global Studies Law Review, 2015, v. 14, n. 4, p. 799
- Article
15
- Southern California Law Review, 2016, v. 89, n. 5, p. 1203
- Article
16
- Houston Journal of International Law, 2015, v. 37, n. 2, p. 543
- Article
17
- Journal of Counterterrorism & Homeland Security International, 2014, v. 20, n. 1, p. 28
- Article
18
- Journal of Counterterrorism & Homeland Security International, 2014, v. 20, n. 1, p. 10
- Article
19
- Virginia Journal of International Law, 2015, v. 55, n. 2, p. 291
- Article
20
- World Affairs, 2014, v. 176, n. 5, p. 13
- Article
21
- World Affairs, 2013, v. 176, n. 4, p. 57
- Article
22
- Law & Contemporary Problems, 1976, v. 40, n. 3, p. 106, doi. 10.2307/1191394
- Article
23
- Faulkner Law Review, 2016, v. 7, n. 2, p. 287
- Article
25
- Progressive Librarian, 2013, n. 41, p. 116
- Article
27
- Harvard Journal of Law & Public Policy, 2015, v. 38, n. 1, p. 117
- Article
29
- Harvard Journal of Law & Public Policy, 2014, v. 37, n. 3, p. 901
- Article
30
- Harvard Journal of Law & Public Policy, 2014, v. 37, n. 3, p. 757
- Article
31
- Library Philosophy & Practice, 2014, p. 1
- Article
32
- Pepperdine Policy Review, 2014, v. 7, p. 1
- Article
34
- German Law Journal, 2015, v. 16, n. 5, p. 1131, doi. 10.1017/s2071832200021064
- Article
35
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 2, p. 47, doi. 10.1080/00963402.2000.11456943
- Article
36
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 3, p. 8
- Article
37
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 2, p. 9
- Article
38
- Bulletin of the Atomic Scientists, 1982, v. 38, n. 3, p. 3, doi. 10.1080/00963402.1982.11455705
- Article
39
- Queen's Quarterly, 2013, v. 120, n. 3, p. 340
- Article
40
- ComputerWorld Hong Kong, 2013, p. 46
- Article
41
- 2014
- Mondale, Walter F.;
- Stein, Robert A.;
- Fahnhorst, Monica C.
- Essay
42
- Minnesota Law Review, 2013, v. 98, n. 1, p. 62
- Gray, David;
- Citron, Danielle
- Article
43
- Washington & Lee Law Review, 2015, v. 72, n. 3, p. 1207
- Article
44
- Stanford Law Review, 2008, v. 60, n. 4, p. 1023
- Katyal, Neal;
- Caplan, Richard
- Article
45
- Government Technology, 2013, v. 26, n. 8, p. 36
- Article
47
- Mathematical Intelligencer, 2016, v. 38, n. 4, p. 36, doi. 10.1007/s00283-016-9675-9
- Korman, Jonathan;
- Tong, Wing-Yee
- Article
48
- Media Asia, 2013, v. 40, n. 3, p. 198, doi. 10.1080/01296612.2013.11689966
- Article
49
- Brooklyn Journal of International Law, 2015, v. 40, n. 3, p. 989
- Article
50
- Hoover Digest: Research & Opinion on Public Policy, 2015, n. 4, p. 56
- Article