Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 1997
- David Bainbridge:
Intellectual Property, 3rd Edition, David Bainbridge. Pitman Publishing (1996), 572, 0273 622 79X £27.99 soft-cover. Comput. Law Secur. Rev. 13(1): 45 (1997) - David Bainbridge:
Law report - I: Cannot employees also be hackers? Comput. Law Secur. Rev. 13(5): 352-354 (1997) - Michael D. Scott:
Liability in cyberspace - III: Creating a corporate internet acceptable use policy. Comput. Law Secur. Rev. 13(6): 451-453 (1997) - Michael S. Baum:
Secure electronic commerce - II: The ABA digital signature guidelines. Comput. Law Secur. Rev. 13(6): 457-458 (1997) - Stephan Beutler:
The protection of multimedia products under international copyright law. Comput. Law Secur. Rev. 13(4): 253-260 (1997) - Stephan Beutler:
Multimedia law: The protection of multimedia products under international copyright law - Part II. Comput. Law Secur. Rev. 13(5): 319-324 (1997) - Robert P. Bigelow:
A report from the United States - part II. Comput. Law Secur. Rev. 13(2): 87-95 (1997) - Dave Birch:
Secure electronic commerce - I: The certificate business public key infrastructure will be big business. Comput. Law Secur. Rev. 13(6): 454-456 (1997) - Robert T. J. Bond:
European union directive on the legal protection of databases. Comput. Law Secur. Rev. 13(6): 401-412 (1997) - J. Dianne Brinson:
Multimedia Law and Business Handbook, J. Dianne Brinson, Mark F. Radcliffe. Ladera Press, NY (1996), 468, ISBN 096 391 7323 US $44.95. Comput. Law Secur. Rev. 13(1): 28 (1997) - Gillian Bull:
Market data rights bingo. Comput. Law Secur. Rev. 13(2): 75-86 (1997) - Gillian Bull:
Conference review: Cyberl@W, IBC UK conferences limited, Monday 23 June 1997, Strand Palace Hotel, London. Comput. Law Secur. Rev. 13(5): 381-382 (1997) - Simon Chalton:
Data protection: Data protection: The government's legislative proposals. Comput. Law Secur. Rev. 13(6): 425-428 (1997) - Andrew Charlesworth:
Law report - I: Glencore international A.G. and another v bank of China [1996] 1 Lloyd's law reports 135. (CA) decision of 8 november 1995. Comput. Law Secur. Rev. 13(2): 120-122 (1997) - Alexander de Daranyi:
Software law - Switzerland: An introduction to software protection under swiss law. Comput. Law Secur. Rev. 13(5): 340-343 (1997) - Helena Davies:
Business transfers and outsourcing: The Süzen and Betts cases. Comput. Law Secur. Rev. 13(4): 272-273 (1997) - Simon Davies:
Privacy law - Australia: The Australian federal government has abandoned its election promise to enact privacy legislation for business. Comput. Law Secur. Rev. 13(6): 429-430 (1997) - David Davies, Aon Bain Hogg:
Risk management: Holistic risk management. Comput. Law Secur. Rev. 13(5): 336-339 (1997) - Stephen Digby:
EURIM report: EURIM - European informatics market - The next phase. Comput. Law Secur. Rev. 13(5): 349-351 (1997) - Robyn Durie:
The internet, trademarks and domain names. Comput. Law Secur. Rev. 13(1): 29-33 (1997) - Assafa Endeshaw:
Commercial law: Assimilating software to 'goods' by analogy. Comput. Law Secur. Rev. 13(5): 325-330 (1997) - David Flint:
Internet domain names: Proposal for a cybermark. Comput. Law Secur. Rev. 13(3): 163-166 (1997) - Scott Glickson:
Commerce in cyberspace - II: Point, click, and buy: Contracting for online products and services. Comput. Law Secur. Rev. 13(6): 436-441 (1997) - Matthew Godfrey-Faussett:
Outsourcing: Telecommunications outsourcing - A legal perspective. Comput. Law Secur. Rev. 13(3): 176-181 (1997) - Robert J. Hart:
The case for patent protection for computer program-related inventions. Comput. Law Secur. Rev. 13(4): 247-252 (1997) - Simone van der Hof:
First results of The Dutch National Programme on Information Technology and Law. Comput. Law Secur. Rev. 13(1): 42-45 (1997) - Andrew Horrocks, Kit Burden:
Domain names: Domain names - Fighting for identity. Comput. Law Secur. Rev. 13(5): 303-306 (1997) - Glenn P. Jenkins:
Information Technology and Innovation in Tax Administration, Glenn P. Jenkins (Ed.). Kluwer Law International (1996), 213, NLG 125.00/US $84.00/£56.00, ISBN: 90 411 09668. Comput. Law Secur. Rev. 13(1): 72 (1997) - David Judah:
Liability in cyberspace - I: Defamation in cyberspace. Comput. Law Secur. Rev. 13(6): 442-446 (1997) - Justice Michael Kirby:
Cryptography policy: OECD cryptography guidelines in context. Comput. Law Secur. Rev. 13(3): 182-186 (1997)
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 18:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint