Author of the publication

Corporate Complicity in Internet Censorship in China: Who Cares for the Global Compact or the Global Online Freedom Act?

. George Washington International Law Review, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corporate Complicity in Internet Censorship in China: Who Cares for the Global Compact or the Global Online Freedom Act?. George Washington International Law Review, (2006)Microaneurysm Detection in Diabetic Retinopathy Using Genetic Algorithm and SVM Classification Techniques., , , , and . RTIP2R (2), volume 1036 of Communications in Computer and Information Science, page 286-293. Springer, (2018)Enhanced spectrum aggregation based frequency-band selection routing protocol for cognitive radio ad-hoc networks., and . Concurr. Comput. Pract. Exp., (2019)Compact Stateful Encryption Schemes with Ciphertext Verifiability., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 87-104. Springer, (2012)Identity-Based Group Encryption Revisited., , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 205-209. Springer, (2017)Identity Based Self Delegated Signature - Self Proxy Signatures., , , and . NSS, page 568-573. IEEE Computer Society, (2010)Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures., , and . IACR Cryptology ePrint Archive, (2011)Identity Based Partial Aggregate Signature Scheme Without Pairing., , , and . IACR Cryptology ePrint Archive, (2010)On the Provable Security of Multi-Receiver Signcryption Schemes., , , , and . IACR Cryptology ePrint Archive, (2008)Identity Based Online/Offline Encryption Scheme., , and . IACR Cryptology ePrint Archive, (2010)