Showing results 1 to 20 of 41
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Anti-unfair competition law in China: still awaiting supplements Journal:IIC - International Review of Industrial Property and Copyright Law | 1995 | ||
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | ||
2005 | |||
The case for decompilation: a response to the Law Reform Commission's report on copyright Journal:Hong Kong Law Journal | 1995 | ||
China's protection of industrial designs: is it well-designed? Journal:Intellectual Property Quarterly | 1998 | ||
Comparative study on the liability for trade mark infringement of online auction providers Journal:European Intellectual Property Review | 2009 | ||
A comprehensive and real-time fingerprint verification system for embedded devices Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2005 | ||
Computer software as intellectual property: the case of China Journal:Computer and Telecommunications Law Review | 1998 | ||
Computer-assisted learning: Chinese characters and lexicons Book:Different Aspects of Learning Chinese Language | 1994 | ||
Copyright protection for computer software: does Hong Kong meet international standards? Journal:Hong Kong Law Journal | 2004 | ||
A critique of copyright protection for computer software in the People's Republic of China Journal:European Intellectual Property Review | 1994 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | ||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
A face authentication system for mobile devices: Optimization techniques Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2005 | ||
A face recognition embedded system Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2005 | ||
1997 | |||
The Hong Kong Legal Information Institute (HKLII): its role in free access to global law via the Internet Journal:Hong Kong Law Journal | 2002 |