Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2021
- Siena Anstis:
Government procurement law and hacking technology: The role of public contracting in regulating an invisible market. Comput. Law Secur. Rev. 41: 105536 (2021) - Joke Baeck, Ignace Claeys:
Restitution of money spent on loot boxes in video games? Comput. Law Secur. Rev. 41: 105566 (2021) - Marco Cappai, Giuseppe Colangelo:
Taming digital gatekeepers: the 'more regulatory approach' to antitrust law. Comput. Law Secur. Rev. 41: 105559 (2021) - Ziyan Chen, Liu Shiguo:
China's self-driving car legislation study. Comput. Law Secur. Rev. 41: 105555 (2021) - Giovanni Comandé, Giulia Schneider:
Can the GDPR make data flow for research easier? Yes it can, by differentiating! A careful reading of the GDPR shows how EU data protection law leaves open some significant flexibilities for data protection-sound research activities. Comput. Law Secur. Rev. 41: 105539 (2021) - Shujie Cui, Peng Qi:
The legal construction of personal information protection and privacy under the Chinese Civil Code. Comput. Law Secur. Rev. 41: 105560 (2021) - Pratik Prakash Dixit:
From gatekeepers to publishers: Liability of internet intermediaries in India for hosting defamatory content. Comput. Law Secur. Rev. 41: 105558 (2021) - Fei Feng, Xia Wang, Tianxiang Chen:
Analysis of the attributes of rights to inferred information and China's choice of legal regulation. Comput. Law Secur. Rev. 41: 105565 (2021) - Jiangqiu GE, Li Chen:
The obligation to provide "non-personalised" search results under the Chinese E-commerce law. Comput. Law Secur. Rev. 41: 105568 (2021) - Rosa M. Garcia-Teruel, Héctor Simón-Moreno:
The digital tokenization of property rights. A comparative perspective. Comput. Law Secur. Rev. 41: 105543 (2021) - Filip Geburczyk:
Automated administrative decision-making under the influence of the GDPR - Early reflections and upcoming challenges. Comput. Law Secur. Rev. 41: 105538 (2021) - Robert Hegarty, Mark Taylor:
Digital evidence in fog computing systems. Comput. Law Secur. Rev. 41: 105576 (2021) - Joris Van Hoboken, Ronan Ó Fathaigh:
Smartphone platforms as privacy regulators. Comput. Law Secur. Rev. 41: 105557 (2021) - Vikas Kathuria, Mark-Oliver Mackenrodt:
The case against 'Narrow' price parity clauses. Comput. Law Secur. Rev. 41: 105574 (2021) - Alessandro Mantelero, Maria Samantha Esposito:
An evidence-based methodology for human rights impact assessment (HRIA) in the development of AI data-intensive systems. Comput. Law Secur. Rev. 41: 105561 (2021) - Dimitra Markopoulou, Vagelis Papakonstantinou:
The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The case of the health sector in particular. Comput. Law Secur. Rev. 41: 105502 (2021) - Janos Meszaros, Chih-Hsing Ho:
AI research and data protection: Can the same rules apply for commercial and academic research under the GDPR? Comput. Law Secur. Rev. 41: 105532 (2021) - Maciej Rogalski:
Security assessment of suppliers of telecommunications infrastructure for the provision of services in 5G technology. Comput. Law Secur. Rev. 41: 105556 (2021) - Marcin Rojszczak:
The uncertain future of data retention laws in the EU: Is a legislative reset possible? Comput. Law Secur. Rev. 41: 105572 (2021) - Wei Shen, Liyang Hou:
China's central bank digital currency and its impacts on monetary policy and payment competition: Game changer or regulatory toolkit? Comput. Law Secur. Rev. 41: 105577 (2021) - Aurelia Tamò-Larrieux:
Decision-making by machines: Is the 'Law of Everything' enough? Comput. Law Secur. Rev. 41: 105541 (2021) - Xavier Tracol:
The two judgments of the European Court of Justice in the four cases of Privacy International, La Quadrature du Net and Others, French Data Network and Others and Ordre des Barreaux francophones et germanophone and Others: The Grand Chamber is trying hard to square the circle of data retention. Comput. Law Secur. Rev. 41: 105540 (2021) - Niko Tsakalakis, Sophie Stalla-Bourdillon, Laura Carmichael, Trung Dong Huynh, Luc Moreau, Ayah Helal:
The dual function of explanations: Why it is useful to compute explanations. Comput. Law Secur. Rev. 41: 105527 (2021) - Eduard Fosch-Villaronga, Tobias Mahler:
Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Comput. Law Secur. Rev. 41: 105528 (2021) - Sandra Wachter, Brent D. Mittelstadt, Chris Russell:
Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI. Comput. Law Secur. Rev. 41: 105567 (2021)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 12:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint