Works matching DE "ESCROWS"
1
- Michigan Law Review, 2012, v. 111, n. 2, p. 145
- Article
2
- Fordham Journal of Corporate & Financial Law, 2014, v. 19, n. 3, p. 681
- Article
4
- Computer Journal, 2002, v. 45, n. 6, p. 661, doi. 10.1093/comjnl/45.6.661
- Abe, Masayuki;
- Kanda, Masayuki
- Article
5
- Information Technology & Management, 2009, v. 10, n. 2/3, p. 83, doi. 10.1007/s10799-009-0059-0
- Abbasi, Ahmed;
- Hsinchun Chen
- Article
6
- Telkomnika, 2016, v. 14, n. 1, p. 335, doi. 10.12928/TELKOMNIKA.v14i1.2919
- Article
7
- American Bar Association Journal, 1975, v. 61, n. 5, p. 630
- Article
8
- Contract Management, 2008, v. 48, n. 2, p. 30
- Article
9
- Journal of Corporation Law, 1985, v. 10, n. 3, p. 689
- Article
10
- California Law Review, 1917, v. 5, n. 5, p. 416
- F. H. M.;
- J. M. P.;
- E. W. D.;
- J. C. N.;
- A. M. K.;
- S. M. A.
- Article
11
- NETNOMICS: Economic Research & Electronic Networking, 2004, v. 6, n. 3, p. 187, doi. 10.1007/s11066-005-2304-y
- Article
12
- Journal of Financial Services Research, 1994, v. 8, n. 1, p. 59, doi. 10.1007/BF01052939
- Hendershott, Patrich H.;
- Villani, Kevine E.
- Article
13
- Tort Trial & Insurance Practice Law Journal, 2011, v. 47, n. 1, p. 501
- Hill, Jerel J.;
- Ahearn, Karen C.;
- Parker, Steven R.
- Article
14
- Tort Trial & Insurance Practice Law Journal, 2010, v. 45, n. 2, p. 601
- Hill, Jerel J.;
- Parker, Steven R.
- Article
15
- Journal of Management in Engineering, 1997, v. 13, n. 6, p. 22, doi. 10.1061/(ASCE)0742-597X(1997)13:6(22)
- Article
16
- Journal of Engineering Science & Technology Review, 2013, v. 6, n. 2, p. 35
- Article
17
- Journal of Organizational Computing & Electronic Commerce, 2007, v. 17, n. 2, p. 119, doi. 10.1080/10919390701294038
- Han Zhang;
- Zhangxi Lin;
- Xiaorui Hu
- Article
18
- Revista de Economía y Derecho, 2014, v. 10, n. 40, p. 49
- Mulanovich, Gonzalo Zegarra
- Article
19
- Bench & Bar of Minnesota, 2014, v. 71, n. 6, p. 21
- Article
20
- Journal of Financial & Quantitative Analysis, 1971, v. 6, n. 5, p. 1173, doi. 10.2307/2329855
- Article
21
- Challenge (05775132), 1965, v. 14, n. 2, p. 8, doi. 10.1080/05775132.1965.11469824
- Article
22
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1480, doi. 10.3837/tiis.2013.06.008
- Ji Yao;
- Jiguo Li;
- Yichen Zhang
- Article
23
- Mercer Law Review, 2012, v. 63, n. 4, p. 1267
- Article
24
- Virginia Sports & Entertainment Law Journal, 2018, v. 17, n. 2, p. 119
- Article
25
- Telecommunication Systems, 2018, v. 69, n. 2, p. 253, doi. 10.1007/s11235-018-0461-1
- Wei, Quanyun;
- Qi, Fang;
- Tang, Zhe
- Article
26
- Security & Communication Networks, 2015, v. 8, n. 8, p. 1575, doi. 10.1002/sec.1105
- Tian, Miaomiao;
- Huang, Liusheng
- Article
27
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 7, p. 3629, doi. 10.3837/tiis.2017.07.018
- Yang Lu;
- Gang Wang;
- Jiguo Li;
- Jian Shen
- Article
28
- Journal of Law & the Biosciences, 2015, v. 2, n. 1, p. 69, doi. 10.1093/jlb/lsu031
- Van der Loos, Kiah I.;
- Longstaff, Holly;
- Virani, Alice;
- Illes, Judy
- Article
29
- Assessment Journal, 1999, v. 6, n. 6, p. 60
- Article
30
- Wireless Personal Communications, 2017, v. 92, n. 2, p. 495, doi. 10.1007/s11277-016-3554-8
- Zhou, Caixue;
- Gao, Guangyong;
- Cui, Zongmin
- Article
31
- Brief, 2015, v. 45, n. 1, p. 6
- Squire, Ryan C;
- Parker, Steven R
- Article
32
- Law & Contemporary Problems, 1951, v. 16, n. 2, p. 267, doi. 10.2307/1190095
- Article
33
- International Journal of Information Security, 2006, v. 5, n. 4, p. 217, doi. 10.1007/s10207-006-0002-x
- Al-Riyami, S.;
- Malone-Lee, J.;
- Smart, N.
- Article
34
- International Journal of Information Security, 2002, v. 1, n. 3, p. 161, doi. 10.1007/s10207-002-0014-0
- Gonzáles Nieto, J.M.;
- Viswanathan, K.;
- Boyd, C.;
- Clark, A.;
- Dawson, E.
- Article
35
- Business Lawyer, 2021, v. 76, n. 3, p. 841
- Article
36
- Business Lawyer, 2014, v. 69, n. 2, p. 563
- Brown, Laura Hobson;
- Greco, Laura;
- Savoie, Robert
- Article
37
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 4, p. 389
- Article
38
- University of Baltimore Law Review, 2022, v. 51, n. 2, p. 247
- Article
39
- Iowa Law Review, 2013, v. 98, n. 5, p. 1707
- Article
40
- Cryptologia, 2011, v. 35, n. 1, p. 58, doi. 10.1080/01611194.2010.515905
- Article
41
- Journal of Information Science & Engineering, 2013, v. 29, n. 3, p. 459
- JIANHONG ZHANG;
- ZHIBIN SUN
- Article
42
- Advances in Mathematics of Communications, 2015, v. 9, n. 3, p. 353, doi. 10.3934/amc.2015.9.353
- YANG LU;
- QUANLING ZHANG;
- JIGUO LI
- Article
43
- Banking Law Journal, 2012, v. 129, n. 9, p. 809
- MIERZEWSKI, MICHAEL B.;
- HOCHBERG, JEREMY W.
- Article
44
- Indian Journal of Public Health Research & Development, 2018, v. 9, n. 3, p. 769, doi. 10.5958/0976-5506.2018.00381.9
- Sugumar, B.;
- Ramakrishnan, M.
- Article
45
- Accounting Review, 1939, v. 14, n. 4, p. 355
- Article
46
- Arbitration Journal, 1988, v. 43, n. 2, p. 67
- Article
47
- Arbitration Journal, 1976, v. 31, n. 2, p. 139
- Article
48
- Elevator World, 2007, v. 55, n. 8, p. 28
- Article