

Author: Ji You
Publisher: Routledge Ltd
ISSN: 1352-3260
Source: Contemporary Security Policy, Vol.27, Iss.2, 2006-08, pp. : 237-257
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Cambridge Law Journal, Vol. 1, Iss. 2, 1922-07 ,pp. :


The evolution of anti-circumvention law
By Brown Ian
International Review of Law, Computers & Technology, Vol. 20, Iss. 3, 2006-11 ,pp. :