Search Results

There are 11730 results for: content related to: Recommendation concerning National Floors of Social Protection, 2012 (No. 202)

  1. Social protection assessment-based national dialogue exercises: Cambodia, Indonesia, Thailand, Viet Nam

    International Social Security Review

    Volume 67, Issue 1, January-March 2014, Pages: 95–119, Valérie Schmitt and Rachael Chadwick

    Article first published online : 17 MAR 2014, DOI: 10.1111/issr.12032

  2. A multivariable definition of adequacy: Challenges and opportunities

    International Social Security Review

    Volume 66, Issue 3-4, July-December 2013, Pages: 171–191, Simon Brimblecombe

    Article first published online : 15 OCT 2013, DOI: 10.1111/issr.12023

  3. National social protection policies in West Africa: A comparative analysis

    International Social Security Review

    Volume 67, Issue 3-4, July-December 2014, Pages: 127–152, Ariel Pino and Anna Maria Badini Confalonieri

    Article first published online : 23 DEC 2014, DOI: 10.1111/issr.12051

  4. The Social Protection Floors Recommendation, 2012 (No. 202): Can a six-page document change the course of social history?

    International Social Security Review

    Volume 66, Issue 3-4, July-December 2013, Pages: 21–43, Michael Cichon

    Article first published online : 15 OCT 2013, DOI: 10.1111/issr.12017

  5. Optimized packet formation in multi-level security wireless data acquisition networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1420–1439, Mohamed Younis, Osama Farrag, Sookyoung Lee and William D'Amico

    Article first published online : 7 DEC 2010, DOI: 10.1002/sec.273

  6. Enterprise security pattern: a new type of security pattern

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1670–1690, Santiago Moral-García, Santiago Moral-Rubio, David G. Rosado, Eduardo B. Fernández and Eduardo Fernández-Medina

    Article first published online : 6 MAR 2014, DOI: 10.1002/sec.863

  7. Cyber Security Education, Training, and Awareness

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Richard Kissel and Mark Wilson

    Published Online : 18 SEP 2009, DOI: 10.1002/9780470087923.hhs458

  8. Revisiting policies to achieve progress towards universal health coverage in low-income countries: Realizing the pay-offs of national social protection floors

    International Social Security Review

    Volume 66, Issue 3-4, July-December 2013, Pages: 145–170, Xenia Scheil-Adlung

    Article first published online : 15 OCT 2013, DOI: 10.1111/issr.12022

  9. United Nations, Charter

    Standard Article

    The Wiley-Blackwell Encyclopedia of Globalization

    Published Online : 29 FEB 2012, DOI: 10.1002/9780470670590.wbeog934

  10. Geneva Conventions

    Standard Article

    The Wiley-Blackwell Encyclopedia of Globalization

    Valerie Epps

    Published Online : 29 FEB 2012, DOI: 10.1002/9780470670590.wbeog235

  11. Privacy preserving smartcard-based authentication system with provable security

    Security and Communication Networks

    Jin Wook Byun

    Article first published online : 17 FEB 2015, DOI: 10.1002/sec.1229

  12. Security-aware scheduling model for computational grid

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 12, 25 August 2012, Pages: 1377–1391, Rekha Kashyap and Deo Prakash Vidyarthi

    Article first published online : 7 OCT 2011, DOI: 10.1002/cpe.1850

  13. A secured, automated, and dynamic end-to-end service level negotiation

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 2, February 2013, Pages: 180–202, M. A. Chalouf and F. Krief

    Article first published online : 18 JAN 2012, DOI: 10.1002/cpe.2806

  14. ISBT Guidelines for Information Security in Transfusion Medicine

    Vox Sanguinis

    Volume 91, Issue s1, July 2006, Pages: S1–S23,

    Article first published online : 22 MAY 2006, DOI: 10.1111/j.1423-0410.2006.00779.x

  15. Profiles for conveying the secure communication requirements of Web services

    Concurrency and Computation: Practice and Experience

    Volume 21, Issue 8, 10 June 2009, Pages: 991–1011, Duane Merrill and Andrew Grimshaw

    Article first published online : 13 FEB 2009, DOI: 10.1002/cpe.1403

  16. Network Security Fundamentals

    Standard Article

    Wiley Encyclopedia of Electrical and Electronics Engineering

    Bruce Barnett

    Published Online : 27 DEC 1999, DOI: 10.1002/047134608X.W5324

  17. Transportation Security Roles and Responsibilities

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Jeffrey L. Western, John Contestabile and Joseph M. Englot

    Published Online : 12 FEB 2010, DOI: 10.1002/9780470087923.hhs143

  18. Secure machine-type communications in LTE networks

    Wireless Communications and Mobile Computing

    Chengzhe Lai, Rongxing Lu, Hui Li, Dong Zheng and Xuemin (Sherman) Shen

    Article first published online : 17 JUL 2015, DOI: 10.1002/wcm.2612

  19. Critical Information Infrastructure Protection, Norway*

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Manuel Suter and Elgin Brunner

    Published Online : 14 NOV 2008, DOI: 10.1002/9780470087923.hhs556

  20. Evaluation, Security

    Standard Article

    Encyclopedia of Software Engineering

    Christopher J. Alberts

    Published Online : 15 JAN 2002, DOI: 10.1002/0471028959.sof108