Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2006
- David Bainbridge:
The registration as designs of computer icons, graphical user interfaces and webpages. Comput. Law Secur. Rev. 22(3): 218-221 (2006) - Mark Turner, Dominic Callaghan:
Will IT in the UK become greener in 2006? - The impact of the new UK Regulations on the use of hazardous substances in electrical and electronic equipment. Comput. Law Secur. Rev. 22(2): 172-175 (2006) - Mark Turner, Dominic Callaghan:
Is shopping online now risk free for UK consumers? Comput. Law Secur. Rev. 22(4): 333-337 (2006) - Mark Turner, Dominic Callaghan:
The regular article tracking developments at the national level in key European countries in the area of IT and communications - Co-ordinated by Herbert Smith LLP and contributed to by firms across Europe. Comput. Law Secur. Rev. 22(5): 365-369 (2006) - Mark Turner, Dominic Callaghan:
The regular article tracking developments at the national level in key European countries in the area of IT and communications - co-ordinated by Herbert Smith LLP and contributed to by firms across Europe. Comput. Law Secur. Rev. 22(6): 449-453 (2006) - María Verónica Pérez Asinari:
Internet gambling and betting services: When the GATS' rules are not applied due to the public morals/public order exception. What lessons can be learnt? Comput. Law Secur. Rev. 22(4): 299-308 (2006) - Carolyn Burbridge:
IPTV: The dependencies for success. Comput. Law Secur. Rev. 22(5): 409-412 (2006) - Kit Burden:
Indemnities in IT and outsourcing contracts. Comput. Law Secur. Rev. 22(1): 68-72 (2006) - Roger Clarke:
Google's gauntlets - Challenges to 'old world corps', consumers and the law. Comput. Law Secur. Rev. 22(4): 288-298 (2006) - Chris Connolly, Prashanti Ravindra:
First UN Convention on eCommerce finalised. Comput. Law Secur. Rev. 22(1): 31-38 (2006) - Emad Abdel Rahim Dahiyat:
Intelligent agents and intentionality: Should we begin to think outside the box? Comput. Law Secur. Rev. 22(6): 472-480 (2006) - Hasan A. Deveci:
Personal jurisdiction: Where cyberspace meets the real world - Part II. Comput. Law Secur. Rev. 22(1): 39-45 (2006) - Tatyana Dobson, Elle Todd:
Radio frequency identification technology. Comput. Law Secur. Rev. 22(4): 313-315 (2006) - Peter Fleischer, Dan Cooper:
EU data privacy in practice - Microsoft's approach to compliance. Comput. Law Secur. Rev. 22(1): 57-67 (2006) - David Flint:
RFID tags, security and the individual. Comput. Law Secur. Rev. 22(2): 165-168 (2006) - Kim Frost, Henrik Udsen:
Anti spam regulation in Denmark. Comput. Law Secur. Rev. 22(3): 241-249 (2006) - Paul Ganley, Ben Allgrove:
Net neutrality: A user's guide. Comput. Law Secur. Rev. 22(6): 454-463 (2006) - Jan Grijpink:
An assessment model for the use of biometrics. Comput. Law Secur. Rev. 22(4): 316-319 (2006) - David Halliday, Miriam Andrews, Tim Wheeler, Greg Lovell:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. Comput. Law Secur. Rev. 22(4): 277-282 (2006) - Richard Kemp, Caspar Gibbons:
Database right after BHB v. William Hill: Enact and repent at leisure. Comput. Law Secur. Rev. 22(6): 493-498 (2006) - Gabriela Kennedy, Douglas Clark:
Outsourcing to China - Risks and benefits. Comput. Law Secur. Rev. 22(3): 250-253 (2006) - Sylvia Mercado Kierkegaard:
Outlawing circumvention of technological measures going overboard: Hollywood style. Comput. Law Secur. Rev. 22(1): 46-56 (2006) - Sylvia Mercado Kierkegaard:
Blogs, lies and the doocing: The next hotbed of litigation? Comput. Law Secur. Rev. 22(2): 127-136 (2006) - Sylvia Mercado Kierkegaard:
Clearing the legal barriers - Danish court upholds 'deep linking' in Home v. Ofir. Comput. Law Secur. Rev. 22(4): 326-332 (2006) - Sylvia Mercado Kierkegaard:
Here comes the 'cybernators'! Comput. Law Secur. Rev. 22(5): 381-391 (2006) - Sylvia Mercado Kierkegaard:
The new media landscape: Regulating the idiot boxes. Comput. Law Secur. Rev. 22(6): 464-471 (2006) - Georgina Kon, Peter Church:
A denial of service but not a denial of justice. Comput. Law Secur. Rev. 22(5): 416-417 (2006) - Eleni Kosta, Peggy Valcke:
Retaining the data retention directive. Comput. Law Secur. Rev. 22(5): 370-380 (2006) - Georg Philip Krog:
The Norwegian "Napster case" - Do hyperlinks constitute the "making available to the public" as a main or accessory act? Comput. Law Secur. Rev. 22(1): 73-77 (2006) - Jonathon Little, Alexander Brown:
Someone to watch over you. Comput. Law Secur. Rev. 22(2): 169-171 (2006)
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 08:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint