Works matching DE "COMPUTER network laws"
1
- Chinese Journal of International Law, 2017, v. 16, n. 2, p. 271, doi. 10.1093/chinesejil/jmx011
- Zhixiong Huan;
- Măcák, Kubo
- Article
2
- International Journal of Law & Information Technology, 2010, v. 18, n. 3, p. 248, doi. 10.1093/ijlit/eaq006
- Article
3
- International Journal of Law & Information Technology, 2012, v. 20, n. 4, p. 249, doi. 10.1093/ijlit/eas019
- Article
5
- Revista Seqüência, 2011, v. 32, n. 63, p. 159, doi. 10.5007/2177-7055.2011v32n63159
- Martini Vial, Sandra Regina;
- Barreto, Ricardo Menna
- Article
6
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 1, p. 31, doi. 10.1007/s12083-012-0160-8
- Sung, Chunhsien;
- Huang, Po-Hsian
- Article
7
- Jurisprudence / Jurisprudencija, 2011, v. 18, n. 2, p. 703
- Štitilis, Darius;
- Pakutinskas, Paulius;
- Dauparaitė, Inga;
- Laurinaitis, Marius
- Article
8
- Valahia University Law Study, 2012, v. 20, n. 2, p. 341
- Article
9
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1961, doi. 10.1007/s11276-013-0571-3
- Islam, Noman;
- Shaikh, Zubair;
- Rehman, Aqeel-ur;
- Siddiqui, Muhammad
- Article
10
- American Business Law Journal, 2011, v. 48, n. 2, p. 285, doi. 10.1111/j.1744-1714.2011.01116.x
- Article
11
- Journal of Law & Society, 2003, v. 30, n. 2, p. 187, doi. 10.1111/1467-6478.00253
- Article
13
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 615
- Article
14
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 613
- Article
15
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 555
- Article
16
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 543
- Article
17
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 519
- Article
18
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 427
- Article
19
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 387
- Article
20
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 1
- Burstein, Aaron;
- DeVries, Will Thomas;
- Menell, Peter S.
- Article
21
- Iowa Law Review, 2015, v. 100, n. 2, p. 501
- Chander, Anupam;
- Lê, Uyên P.
- Article
22
- Arizona Law Review, 2011, v. 53, n. 2, p. 663
- Article
23
- 2017
- Pennington, Michael;
- Patton, Rikki;
- Ray, Amber;
- Katafiasz, Heather
- journal article
24
- Computer Law Review International, 2016, v. 17, n. 6, p. ii, doi. 10.9785/cri-2016-0601
- Article
25
- Computer Law Review International, 2016, v. 17, n. 6, p. i, doi. 10.9785/cri-2016-frontmatter6
- Article
26
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 495, doi. 10.1093/jcsl/krw010
- Article
27
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 383, doi. 10.1093/jcsl/krw015
- Article
28
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 429, doi. 10.1093/jcsl/krw011
- Article
30
- Texas Review of Law & Politics, 1999, v. 4, n. 1, p. 103
- Article
31
- Campbell Law Review, 2013, v. 36, n. 1, p. 147
- Article
32
- Chinese Law & Government, 2010, v. 43, n. 5, p. 21, doi. 10.2753/CLG0009-4609430503
- State Planning Commission, Ministry of Posts and Telecommunications, Ministry of Electronics Industry, National Education Commission, Chinese Academy of Sciences
- Article
33
- Communications & Strategies, 2012, n. 87, p. 83
- Article
34
- American University Law Review, 2017, v. 66, n. 5, p. 1183
- BRILL, HILLARY;
- JONES, SCOTT
- Article
35
- International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 277, doi. 10.1080/13600860500348226
- Article
36
- Nature, 1995, v. 376, n. 6537, p. 200, doi. 10.1038/376200a0
- Article
37
- National Security & Armed Conflict Law Review, 2016, v. 6, p. 233
- Article
38
- Business Lawyer, 2020, v. 76, n. 1, p. 257
- Article
39
- Business Lawyer, 2010, v. 66, n. 1, p. 155
- Fleming, Michael F.;
- Dorrain, Kristine F.
- Article
40
- Business Lawyer, 2009, v. 65, n. 1, p. 251
- Godfread, Paul;
- Dorrain, Kristine
- Article
41
- Business Lawyer, 2009, v. 65, n. 1, p. 229
- Nusbaum, Suzanne;
- Rubens, Jonathan T.;
- Nguyen, Phong D.
- Article
42
- Business Lawyer, 2009, v. 65, n. 1, p. 227
- Article
43
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 189
- Article
44
- Journal of Telecommunications Management, 2008, v. 1, n. 3, p. 224
- Article
45
- Loyola of Los Angeles International & Comparative Law Review, 2023, v. 46, n. 1, p. 45
- Article
46
- Journal of Law, Technology & Policy, 2010, v. 2010, n. 2, p. 345
- Article
47
- Connecticut Law Review, 2011, v. 43, n. 3, p. 709
- Article
48
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 81
- Article
49
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 62
- Article
50
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 32
- Demchak, Chris C.;
- Dombrowski, Peter
- Article