[1]
S. Mann, “Computer architectures for protection of personal informatic property: Putting pirates, pigs and rapists in perspective”, FM, vol. 5, no. 7, Jul. 2000.