

Author: Bulst Friedrich Wenzel
Publisher: Mohr Siebeck
ISSN: 0033-7250
Source: Rabels Zeitschrift fuer auslaendisches und internationales Privatrecht, Vol.73, Iss.4, 2009-10, pp. : 703-726
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Introduction: Valid protection or abusive control?
By Adams A. A.
International Review of Law, Computers & Technology, Vol. 20, Iss. 3, 2006-11 ,pp. :