default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Beatriz Botero Arcila:
AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight? Comput. Law Secur. Rev. 54: 106012 (2024) - Luca Belli, Water B. Gaspar, Shilpa Singh Jaswant:
Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the BRICS countries. Comput. Law Secur. Rev. 54: 106017 (2024) - Christian Bergqvist:
The blocking of Booking/Etraveli - When the first victim of EU's anti-US tech stand was a European. Comput. Law Secur. Rev. 54: 106025 (2024) - Gerard Buckley, Tristan Caulfield, Ingolf Becker:
How might the GDPR evolve? A question of politics, pace and punishment. Comput. Law Secur. Rev. 54: 106033 (2024) - Meng Chen:
Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration. Comput. Law Secur. Rev. 54: 105997 (2024) - Xi Chen:
Algorithmic proxy discrimination and its regulations. Comput. Law Secur. Rev. 54: 106021 (2024) - Giuseppe Colangelo:
Open Banking goes to Washington: Lessons from the EU on regulatory-driven data sharing regimes. Comput. Law Secur. Rev. 54: 106018 (2024) - Giovanni Comandè, Margaret Varilek:
The many features which make the eIDAS 2 Digital Wallet either risky or the ideal vehicle for the transition to post-quantum encryption. Comput. Law Secur. Rev. 54: 106022 (2024) - Erzsébet Csatlós:
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions. Comput. Law Secur. Rev. 54: 105995 (2024) - Pierre Dewitte:
Better alone than in bad company: Addressing the risks of companion chatbots through data protection by design. Comput. Law Secur. Rev. 54: 106019 (2024) - Huijuan Dong, Junkai Chen:
Meta-Regulation: An ideal alternative to the primary responsibility as the regulatory model of generative AI in China. Comput. Law Secur. Rev. 54: 106016 (2024) - Mattia Falduti, Cristine Griffo:
Ontological models for representing image-based sexual abuses. Comput. Law Secur. Rev. 54: 105999 (2024) - Janne Kaisto, Teemu Juutilainen, Joona Kauranen:
Non-fungible tokens, tokenization, and ownership. Comput. Law Secur. Rev. 54: 105996 (2024) - Beatriz Kira:
When non-consensual intimate deepfakes go viral: The insufficiency of the UK Online Safety Act. Comput. Law Secur. Rev. 54: 106024 (2024) - Wenlong Li, Jiahong Chen:
From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China. Comput. Law Secur. Rev. 54: 105994 (2024) - Diego Machado:
The protection of vulnerable algorithmic groups through collective data protection in the onlife world: A Brazilian perspective. Comput. Law Secur. Rev. 54: 106027 (2024) - Alessandro Mantelero:
The Fundamental Rights Impact Assessment (FRIA) in the AI Act: Roots, legal obligations and key elements for a model template. Comput. Law Secur. Rev. 54: 106020 (2024) - Yuliya Miadzvetskaya:
EU sanctions in response to cyber-attacks as crime-based emergency measures. Comput. Law Secur. Rev. 54: 106010 (2024) - Abhilash Nair, James G. H. Griffin:
Pornography, sexual privacy and copyright. Comput. Law Secur. Rev. 54: 105990 (2024) - Paul Quinn, Erika Ellyne, Cong Yao:
Will the GDPR Restrain Health Data Access Bodies Under the European Health Data Space (EHDS)? Comput. Law Secur. Rev. 54: 105993 (2024) - Qiang Ren, Jing Du:
Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context. Comput. Law Secur. Rev. 54: 106028 (2024) - Clara Isabel Velasco Rico, Migle Laukyte:
ETIAS system and new proposals to advance the use of AI in public services. Comput. Law Secur. Rev. 54: 106015 (2024) - Núbia Augusto de Sousa Rocha, Alexandre Nascimento de Almeida, André Nunes, Humberto Angelo:
Critical points for the processing of personal data by the government: An empirical study in Brazil. Comput. Law Secur. Rev. 54: 106023 (2024) - Larissa Galdino de Magalhães Santos:
Open government data in the Brazilian digital government: Enabling an SDG acceleration agenda. Comput. Law Secur. Rev. 54: 106029 (2024) - Mohammed Raiz Shaffique:
Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark? Comput. Law Secur. Rev. 54: 106009 (2024) - Øyvind Anders Arntzen Toftegaard, Guro Grøtterud, Bernhard M. Hämmerli:
Operational Technology resilience in the 2023 draft delegated act on cybersecurity for the power sector - An EU policy process analysis. Comput. Law Secur. Rev. 54: 106034 (2024) - Jakub Vostoupal:
Stuxnet vs WannaCry and Albania: Cyber-attribution on trial. Comput. Law Secur. Rev. 54: 106008 (2024) - Ningyao Ye, Zeyu Zhao:
The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution. Comput. Law Secur. Rev. 54: 106007 (2024) - Sebastian Zielinski:
Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge. Comput. Law Secur. Rev. 54: 106013 (2024)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-28 06:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint