Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr10.bht:"
@article{DBLP:journals/clsr/000294, author = {David Bainbridge}, title = {Innovations (mail order) {LTD} v data protection registrar - data protection tribunal, 29 September 1993 (case {DA/92} 31/49/1)}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {260--261}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90019-1}, doi = {10.1016/0267-3649(94)90019-1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000294.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bequai94, author = {August Bequai}, title = {Update on {US} congressional efforts to regulate electronic monitoring}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {4}, pages = {203--205}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90046-9}, doi = {10.1016/0267-3649(94)90046-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bequai94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BridgeL94, author = {Richard McD. Bridge and Shelley Lane}, title = {Format rights}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {277}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90024-8}, doi = {10.1016/0267-3649(94)90024-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BridgeL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Brown94, author = {Jeremy R. C. Brown}, title = {Technology licensing}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {3}, pages = {110--120}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90055-8}, doi = {10.1016/0267-3649(94)90055-8}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Brown94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Brown94a, author = {Jeremy R. C. Brown}, title = {Reconsideration of licence agreements in Europe: Implications of the '1991' programme, the single market, {EC} enlargement and the {EEA} treaty for technology transfer - part {II} Jeremy Brown's analysis of {EC} licensing policy}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {222--225}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90002-7}, doi = {10.1016/0267-3649(94)90002-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Brown94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Brown94b, author = {Jeremy R. C. Brown}, title = {Technology licensing}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {282--284}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90116-3}, doi = {10.1016/0267-3649(94)90116-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Brown94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BrownlowR94, author = {Peter Brownlow and John Reynolds}, title = {Copyright protection for printed circuit board designs - diagrams as literary works}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {258--259}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90018-3}, doi = {10.1016/0267-3649(94)90018-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BrownlowR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bull94, author = {Gillian Bull}, title = {Licensing and distribution of market data}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {50--55}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90095-7}, doi = {10.1016/0267-3649(94)90095-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bull94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Castell94, author = {Stephen Castell}, title = {Digital broadcasting}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {307--310}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90122-8}, doi = {10.1016/0267-3649(94)90122-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Castell94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Condat94, author = {Jean{-}Bernard Condat}, title = {Toll fraud on french {PBX} systems}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {89--91}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90106-6}, doi = {10.1016/0267-3649(94)90106-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Condat94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies94, author = {Simon Davies}, title = {The Fifteenth Annual Conference of Privacy and Data Protection Commissioners}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {36--37}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90089-2}, doi = {10.1016/0267-3649(94)90089-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies94a, author = {David Davies}, title = {Managing crisis - a live simulation}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {108}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90114-7}, doi = {10.1016/0267-3649(94)90114-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies94b, author = {David Davies}, title = {Computer insurance}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {313--316}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90124-4}, doi = {10.1016/0267-3649(94)90124-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Freeman94, author = {Harvey Freeman}, title = {Satellite services - the future of the signatory affairs office}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {243--244}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90006-X}, doi = {10.1016/0267-3649(94)90006-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Freeman94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Graham94, author = {Rory Graham}, title = {Database law}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {3}, pages = {127--130}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90058-2}, doi = {10.1016/0267-3649(94)90058-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Graham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hart94, author = {Robert Hart}, title = {Software patentability}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {296--303}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90119-8}, doi = {10.1016/0267-3649(94)90119-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hart94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Heather94, author = {Michael A. Heather}, title = {Challenges for the law from cyberspace and virtual worlds}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {17--21}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90078-7}, doi = {10.1016/0267-3649(94)90078-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Heather94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kirby94, author = {Michael Kirby}, title = {Biotechnology and the law}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {2--9}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90075-2}, doi = {10.1016/0267-3649(94)90075-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kirby94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Klaveness94, author = {J{\o}rgen Klaveness}, title = {Practical use of spreadsheets in the analysis of bankruptcies}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {92--93}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90108-2}, doi = {10.1016/0267-3649(94)90108-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Klaveness94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kyer94, author = {C. Ian Kyer}, title = {Software piracy {\&} corporate compliance}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {245--246}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90008-6}, doi = {10.1016/0267-3649(94)90008-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kyer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lea94, author = {Gary Lea}, title = {Passing off and the protection of program look {\&} feel}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {82--83}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90102-3}, doi = {10.1016/0267-3649(94)90102-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lea94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lea94a, author = {Gary Lea}, title = {Intellectual property}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {304--306}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90121-X}, doi = {10.1016/0267-3649(94)90121-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lea94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lloyd94, author = {Ian J. Lloyd}, title = {European information market}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {33--34}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90085-X}, doi = {10.1016/0267-3649(94)90085-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lloyd94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/London94, author = {Wendy London}, title = {Information security {I}}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {29--30}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90082-5}, doi = {10.1016/0267-3649(94)90082-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/London94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/London94a, author = {Wendy R. London}, title = {Harmonization of {IT} laws}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {64--75}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90098-1}, doi = {10.1016/0267-3649(94)90098-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/London94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/London94b, author = {Wendy London}, title = {{EC} information security legislation: Where now?}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {226--233}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90003-5}, doi = {10.1016/0267-3649(94)90003-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/London94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lougher94, author = {Guy Lougher}, title = {Commercial agency contracts: implementation of the {EC} directive}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {94--95}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90109-0}, doi = {10.1016/0267-3649(94)90109-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lougher94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MandevilleLM94, author = {Thomas Mandeville and Donald McLean Lamberton and Stuart MacDonald}, title = {Marketing public sector information: Some issues}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {234--237}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90004-3}, doi = {10.1016/0267-3649(94)90004-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MandevilleLM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Marsh94, author = {David Marsh}, title = {{EDI} 1993; The {UK} National {EDI} Conference; Birmingham October 4th - 7th}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {35}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90087-6}, doi = {10.1016/0267-3649(94)90087-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Marsh94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/McCallough94, author = {Robert McCallough}, title = {Evidential issues in cases of infringement of copyright in software}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {3}, pages = {134--135}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90060-4}, doi = {10.1016/0267-3649(94)90060-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/McCallough94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/McEvoy94, author = {Neil A. McEvoy}, title = {Information security {II}}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {31--32}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90083-3}, doi = {10.1016/0267-3649(94)90083-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/McEvoy94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Palos94, author = {Gyorgy Palos}, title = {The impact of the Hungarian - {USA} agreement on the Hungarian intellectual property law}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {4}, pages = {185--188}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90036-1}, doi = {10.1016/0267-3649(94)90036-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Palos94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ross94, author = {Alastair Ross}, title = {The essentials of {EDI} law - {A} Straightforward legal framework to protect your business: Peter Jones and David Marsh 1993 Softcover 141p}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {91}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90107-4}, doi = {10.1016/0267-3649(94)90107-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ross94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe94, author = {Heather Rowe}, title = {Data protection}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {47}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90092-2}, doi = {10.1016/0267-3649(94)90092-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe94a, author = {Heather Rowe}, title = {Draft {UK} data protection bill}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {280}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90028-0}, doi = {10.1016/0267-3649(94)90028-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sarakinov94, author = {Georgi Sarakinov}, title = {New law on copyright and neighbouring rights in Bulgaria}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {4}, pages = {189--190}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90037-X}, doi = {10.1016/0267-3649(94)90037-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sarakinov94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Smith94, author = {Graham J. H. Smith}, title = {When is a computer not a computer?}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {84--85}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90103-1}, doi = {10.1016/0267-3649(94)90103-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Smith94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/SpelmanM94, author = {Katherine C. Spelman and John Moss}, title = {The intellectual property inventory: Why do it?}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {1}, pages = {22--24}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90079-5}, doi = {10.1016/0267-3649(94)90079-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/SpelmanM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Strivens94, author = {Robert Strivens}, title = {{EC} competition law}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {3}, pages = {121--122}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90056-6}, doi = {10.1016/0267-3649(94)90056-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Strivens94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sympson94, author = {Moira Sympson}, title = {999 !: My computer's stopped breathing !}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {76--81}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90099-X}, doi = {10.1016/0267-3649(94)90099-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sympson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Tapper94, author = {Colin Tapper}, title = {The law commission's report on the reform of the hearsay rule: Its impact upon the reception of computer output}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {86--88}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90105-8}, doi = {10.1016/0267-3649(94)90105-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Tapper94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Vassilaki94, author = {Irini E. Vassilaki}, title = {Interception of telecommunications for criminal investigation - a comparative analysis}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {5}, pages = {238--242}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90005-1}, doi = {10.1016/0267-3649(94)90005-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Vassilaki94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ward94, author = {Conor Ward}, title = {Cheating at cards, plastic fraud: Sharp Practices and naive systems: Naive Systems by Bryan Clough, 1994, Soft Cover, 154pp., {ISBN} 090 792 3283}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {284}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90117-1}, doi = {10.1016/0267-3649(94)90117-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ward94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Worthy94, author = {John Worthy}, title = {Software law}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {3}, pages = {123--126}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90057-4}, doi = {10.1016/0267-3649(94)90057-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Worthy94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wright94, author = {Benjamin Wright}, title = {Electronic commerce}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {311--312}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90123-6}, doi = {10.1016/0267-3649(94)90123-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wright94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac94, author = {Bernard P. Zajac Jr.}, title = {Clinton administration proposes national telecommunications policy}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {2}, pages = {96}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90110-4}, doi = {10.1016/0267-3649(94)90110-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac94a, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {10}, number = {6}, pages = {322--323}, year = {1994}, url = {https://doi.org/10.1016/0267-3649(94)90128-7}, doi = {10.1016/0267-3649(94)90128-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.