default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 1995
- David Bainbridge:
St Albans City & District council v International Computers Ltd, High Court, Scott Baker J., 3rd October 1994. Comput. Law Secur. Rev. 11(1): 39-41 (1995) - David I. Bainbridge:
Case report: The data protection registrar v amnesty international (British section), high court, queen's bench division (divisional court), Rose L.J. & Scott Baker J. 8th November 1994. Comput. Law Secur. Rev. 11(4): 217-219 (1995) - Darren Berman:
Acquiring, Licensing and Exploiting Rights in Multimedia Euroforum Conference London. Comput. Law Secur. Rev. 11(5): 275-276 (1995) - Robert Bond:
Public registers for software programs. Comput. Law Secur. Rev. 11(3): 130-132 (1995) - Gillian Bull:
An interview with Iann Barron, Chairman of Division PLC. Comput. Law Secur. Rev. 11(2): 58-61 (1995) - Gillian Bull:
AIC: Trading information on the networks 19/20 July 1995, London Metropole Hotel. Comput. Law Secur. Rev. 11(6): 352 (1995) - Stephen Castell:
Letter. Comput. Law Secur. Rev. 11(5): 291 (1995) - Susan Collins:
Data protection regulation in the EU. Comput. Law Secur. Rev. 11(5): 269-270 (1995) - Christopher R. Costa:
US v Microsoft II department of justice and microsoft prevail on appeal; US district court judge jackson approves consent decree. Comput. Law Secur. Rev. 11(6): 336-338 (1995) - Stephen J. Doyle:
GATT Trips - A US perspective: GATT, trips, and high tech. Comput. Law Secur. Rev. 11(4): 182-187 (1995) - István Gödölle, László Kékes, Enik Mészáros, Zoltán Szabó:
Changes in Hungarian patent law. Comput. Law Secur. Rev. 11(3): 152 (1995) - Graham Greenleaf:
The Barrett review - a blueprint for expanding Australian telecommunications interception. Comput. Law Secur. Rev. 11(3): 143-146 (1995) - Robert J. Hart:
A voluntary international numbering system - the latest WIPO proposals. Comput. Law Secur. Rev. 11(3): 127-129 (1995) - Gordon Hughes, David Cosgrave:
Legal questions involving the internet. Comput. Law Secur. Rev. 11(6): 321-324 (1995) - Sally Jackson:
The Labour Party - Communicating Britain's future. Comput. Law Secur. Rev. 11(5): 290 (1995) - C. Ian Kyer:
Information technology law: What does the future hold? Comput. Law Secur. Rev. 11(3): 140-142 (1995) - Thomas Lillywhite:
CLSR special supplement review. Comput. Law Secur. Rev. 11(2): 111 (1995) - Zbynek Loebl:
Amendment of the Czech copyright. Comput. Law Secur. Rev. 11(3): 152-153 (1995) - Michael Marinos:
News and comment on recent developments from around the world. Comput. Law Secur. Rev. 11(3): 160-170 (1995) - Mark O'Conor:
1st annual review of IT law - IPC Conferences Ltd. Comput. Law Secur. Rev. 11(3): 156-159 (1995) - Yves Poullet, Jean-Paul Triaille, Francois van der Mensbrugghe, Valerie Willems:
Telecommunications law: Convergence between media and telecommunications: Towards a new regulatory framework. Comput. Law Secur. Rev. 11(4): 174-181 (1995) - Christopher Rees:
Digital information: Its likely effect on the law. Comput. Law Secur. Rev. 11(6): 318-320 (1995) - J. A. L. Sterling:
Testing for subsistence and infringement of copyright in computer programs: Some US and UK cases. Comput. Law Secur. Rev. 11(3): 119-126 (1995) - Aaron Taebi:
Impact of Bulletin Board Systems (BBS) on 'personal data'. Comput. Law Secur. Rev. 11(3): 154-155 (1995) - Mark Turner:
Libel online - The UK perspective. Comput. Law Secur. Rev. 11(6): 325-326 (1995) - Alan S. Wernick:
'Market realities' in the analysis of copyright infringement of computer programs. Comput. Law Secur. Rev. 11(3): 133-135 (1995) - Benjamin Wright:
Alternatives for signing electronic documents. Comput. Law Secur. Rev. 11(3): 136-139 (1995) - Editorial. Comput. Law Secur. Rev. 11(1): 1 (1995)
- Database detection methods in criminal investigation. Comput. Law Secur. Rev. 11(1): 2-11 (1995)
- Unfair contract terms directive: Suppliers beware: Implementation of the unfair contract terms directive in Europe. Comput. Law Secur. Rev. 11(4): 194-198 (1995)
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 05:22 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint