Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
79 | Tobias Scheidat, Claus Vielhauer, Jana Dittmann |
Advanced Studies on Reproducibility of Biometric Hashes. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
biometric hashing, semantic fusion, verification, measures, Biometrics, collision, handwriting, reproducibility |
79 | Subashini Balachandran, Cornel Constantinescu |
Sequence of Hashes Compression in Data De-duplication. |
DCC |
2008 |
DBLP DOI BibTeX RDF |
Data De-duplication, cryptographic hashes compression |
65 | Flavio D. Garcia, Peter van Rossum |
Sound Computational Interpretation of Symbolic Hashes in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Chuohao Yeo, Parvez Ahammad, Kannan Ramchandran |
Rate-efficient visual correspondences using random projections. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Qusai Abuein, Susumu Shibusawa |
Signature Amortization Using Multiple Connected Chains. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
Multicast stream authentication, signature amortization, web security, hash chain |
50 | Peter Gutmann, David Naccache, Charles C. Palmer |
When Hashes Collide. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
cryptography, hashes, scripts |
43 | Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Randomized radon transforms for biometric authentication via fingerprint hashing. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
authentication, biometrics, fingerprints, hashing, radon transform |
37 | Sreenivas Gollapudi, Rina Panigrahy |
The power of two min-hashes for similarity search among hierarchical data objects. |
PODS |
2008 |
DBLP DOI BibTeX RDF |
earth movers distance, similarity, locality sensitive hashing |
37 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
37 | Oztan Harmanci, Vishal Monga, Mehmet Kivanç Mihçak |
Geometrically Invariant Image Watermarking via Robust Perceptual Hashes. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
37 | César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela |
Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. |
PPSN |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Josef Scharinger |
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Madhu Ahluwalia, Ruchika Gupta, Aryya Gangopadhyay, Yelena Yesha, Michael McAllister |
Target-based database synchronization. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
change detection capture, database synchronization, databases, synchronization, data warehouse |
28 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack |
28 | Vassil Roussev, Golden G. Richard III, Lodovico Marziale |
Class-Aware Similarity Hashing for Data Classification. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
Similarity hashing, class-aware similarity hashing, classprints |
28 | Mythili Vutukuru, Hari Balakrishnan, Vern Paxson |
Efficient and Robust TCP Stream Normalization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Normalization, Evasion Attacks |
28 | Wiebren de Jonge, Bart Jacobs 0001 |
Privacy-Friendly Electronic Traffic Pricing via Commits. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Shunsuke Mogaki, Masaru Kamada, Tatsuhiro Yonekura, Shusuke Okamoto, Yasuhiro Ohtaki, Mamun Bin Ibne Reaz |
Time-stamp service makes real-time gaming cheat-free. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
cheat-proofing, real-time network gaming, time-stamp service |
28 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
28 | Zhenyan Li, Yap-Peng Tan |
Content-based video copy detection with video signature. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han |
The N/R One Time Password System. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Philippe Oechslin |
Making a Faster Cryptanalytic Time-Memory Trade-Off. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off |
28 | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves |
Personal Secure Booting. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ted Krovetz, Phillip Rogaway |
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
software-optimized hashing, UMAC, message authentication, Universal hashing |
27 | Stefan Katzenbeisser 0001, Klaus Kursawe, Joop Talstra |
Graceful infringement reactions in DRM systems. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
device revocation, watermarking, DRM, perceptual hashes |
27 | Paul Beame, Martin Tompa, Peiyuan Yan |
Communication-Space Tradeoffs for Unrestricted Protocols |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
communicating branching programs, unrestricted protocols, communication-space tradeoffs, hash functions, hashes, matrix-vector products |
23 | Grant Greenberg, Aditya Narayan Ravi, Ilan Shomorony |
LexicHash: sequence similarity estimation via lexicographic comparison of hashes. |
Bioinform. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shashank Shekher Tripathi, Volker Skwarek |
Fuzzified advanced robust hashes for identification of digital and physical objects. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Rudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling 0001 |
Poster: From Hashes to Ashes - A Comparison of Transcription Services. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Pavel Novák, Patrik Kaura, Václav Oujezský, Tomás Horváth |
Ransomware File Detection Using Hashes and Machine Learning. |
ICUMT |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Sasa Loncarevic, Bruno Skendrovic, Ivan Kovacevic, Stjepan Gros |
Detecting JavaScript libraries using identifiers and hashes. |
MIPRO |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marius Leon Hammann, Martin Steinebach, Huajian Liu, Niklas Bunzel |
Predicting positions of flipped bits in robust image hashes. |
Media Watermarking, Security, and Forensics |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Haoping Liu, Josiah Hagen, Muqeet Ali, Jonathan Oliver |
An Evaluation of Malware Triage Similarity Hashes. |
ICEIS (1) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Frieder Uhlig, Lukas Struppek, Dominik Hintersdorf, Kristian Kersting |
Transformer-Boosted Anomaly Detection with Fuzzy Hashes. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mark Zhandry |
New Constructions of Collapsing Hashes. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Aldo Gunsing, Bart Mennink |
Collapseability of Tree Hashes. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Peter Stolz, Sebastian Roth, Ben Stock |
To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. |
SP (Workshops) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mark Zhandry |
New Constructions of Collapsing Hashes. |
CRYPTO (3) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Shubhani Aggarwal, Neeraj Kumar 0001 |
Chapter Three - Hashes. |
Adv. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Li Wang, Lilon Wangner |
Mathematical Models for Local Sensing Hashes. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Loganaden Velvindron, Kathleen Moriarty, Alessandro Ghedini |
Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. |
RFC |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu 0001, Yongcheng Song |
Verifiable image revision from chameleon hashes. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Henri T. Heinonen, Alexander Semenov |
Recycling Hashes from Reversible Bitcoin Mining to Seed Pseudorandom Number Generators. |
ICBC |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, Martín Ochoa |
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes. |
DIMVA |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Martin Steinebach, Sebastian Lutz, Huajian Liu |
Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification. |
J. Cyber Secur. Mobil. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Doriane Perard, Xavier Goffin, Jérôme Lacan |
Using Homomorphic hashes in coded blockchains. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
23 | Nicholas R. Allgood, Charles K. Nicholas |
A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
23 | David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig |
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
23 | David Derler, Kai Samelin, Daniel Slamanig |
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
23 | Batyr Charyyev, Mehmet Hadi Gunes |
Voice Command Fingerprinting with Locality Sensitive Hashes. |
CPSIOTSEC@CCS |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Aldo Gunsing, Bart Mennink |
Collapseability of Tree Hashes. |
PQCrypto |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Batyr Charyyev, Mehmet Hadi Gunes |
IoT Traffic Flow Identification using Locality Sensitive Hashes. |
ICC |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor |
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Batyr Charyyev, Mehmet Hadi Gunes |
Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes. |
GLOBECOM |
2020 |
DBLP DOI BibTeX RDF |
|
23 | David Derler, Kai Samelin, Daniel Slamanig |
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. |
Public Key Cryptography (1) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig |
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions. |
SCN |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Canyang Shi, Huiping Sun |
HoneyHash: Honeyword Generation Based on Transformed Hashes. |
NordSec |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Robert L. Bradford, Sofia Dard, Emily R. Pfaff, Ashok K. Krishnamurthy |
Utilizing Encrypted Hashes to Link Patient Cohorts via Streamlined SAS Programs. |
AMIA |
2020 |
DBLP BibTeX RDF |
|
23 | Ian Shiel, Stephen O'Shaughnessy |
Improving file-level fuzzy hashes for malware variant classification. |
Digit. Investig. |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown |
ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
23 | Rishabh Mehta, Naman Kapoor, Soumya Sourav, Rajeev Shorey |
Decentralised Image Sharing and Copyright Protection using Blockchain and Perceptual Hashes. |
COMSNETS |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Martin Steinebach, Sebastian Lutz, Huajian Liu |
Privacy and Robust Hashes. |
ARES |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Sara Migliorini, Mauro Gambini, Carlo Combi, Marcello La Rosa |
The Rise of Enforceable Business Processes from the Hashes of Blockchain-Based Smart Contracts. |
BPMDS/EMMSAD@CAiSE |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown |
ARCHANGEL: Tamper-Proofing Video Archives Using Temporal Content Hashes on the Blockchain. |
CVPR Workshops |
2019 |
DBLP BibTeX RDF |
|
23 | Samuele Girotto, Matteo Comin, Cinzia Pizzi |
FSH: fast spaced seed hashing exploiting adjacent hashes. |
Algorithms Mol. Biol. |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Maxim Berman, Matthew B. Blaschko |
Supermodular Locality Sensitive Hashes. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
23 | Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
23 | Yongwei Wang, Hamid Palangi, Z. Jane Wang 0001, Haoqian Wang |
RevHashNet: Perceptually de-hashing real-valued image hashes for similarity retrieval. |
Signal Process. Image Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti |
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. |
CODASPY |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Johan Garcia 0001 |
Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files. |
NTMS |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. |
AFRICACRYPT |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Bernard Vukelic |
Novi algoritam za izradu percepcijskih sažetaka temeljen na izdvajanju atributa biometrijskih karakteristika ; A novel algorithm for the development of perceptual hashes based on extraction of attributes of biometric characteristics. |
|
2018 |
RDF |
|
23 | Aneesh Sharma, C. Seshadhri 0001, Ashish Goel |
When Hashes Met Wedges: A Distributed Algorithm for Finding High Similarity Vectors. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
23 | Junade Ali |
Mechanism for the prevention of password reuse through Anonymized Hashes. |
PeerJ Prepr. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
23 | Qinghai Gao |
An approach to matching fingerprints using cryptographic one-way hashes. |
Int. J. Biom. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Aneesh Sharma, C. Seshadhri 0001, Ashish Goel |
When Hashes Met Wedges: A Distributed Algorithm for Finding High Similarity Vectors. |
WWW |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Amanda Lee, Travis Atkison |
A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions. |
ACM Southeast Regional Conference |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Ruiyu Zhu, Yan Huang 0001 |
JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes. |
ASIACRYPT (2) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Andreas Fiessler, Daniel Loebenberger, Sven Hager, Björn Scheuermann 0001 |
On the Use of (Non-)Cryptographic Hashes on FPGAs. |
ARC |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Alberto Rivas, Pablo Chamoso, Javier J. Martín-Limorti, Sara Rodríguez 0001, Fernando de la Prieta, Javier Bajo |
Image Matching Algorithm Based on Hashes Extraction. |
EPIA |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Rong Wang, Hao Chen 0002, Jianhua Sun 0002 |
Phoney: protecting password hashes with threshold cryptology and honeywords. |
Int. J. Embed. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Kave Eshghi, Mehran Kafai |
The CRO kernel: Using Concomitant Rank Order hashes for sparse high dimensional randomized feature maps. |
ICDE |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn |
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. |
DBSec |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Hwei-Ming Ying, Noboru Kunihiro |
Decryption of Frequent Password Hashes in Rainbow Tables. |
CANDAR |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Emin Islam Tatli |
Cracking More Password Hashes With Patterns. |
IEEE Trans. Inf. Forensics Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Christian Winter 0001, Martin Steinebach, York Yannikos |
Fast indexing strategies for robust image hashes. |
Digit. Investig. |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Mehran Kafai, Kave Eshghi, Bir Bhanu |
Discrete Cosine Transform Locality-Sensitive Hashes for Face Retrieval. |
IEEE Trans. Multim. |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Pai-Chou Wang |
Dynamic Reducts Generation using Cascading Hashes. |
Int. J. Found. Comput. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Rene Romann, Ralf Salomon |
Salted hashes for message authentication - proof of concept on tiny embedded systems. |
IES |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Shuying Liang, Weibin Sun, Matthew Might |
Fast Flow Analysis with Godel Hashes. |
SCAM |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Stephen Farrell, Dirk Kutscher, Christian Dannewitz, Börje Ohlman, Ari Keränen, Phillip M. Hallam-Baker |
Naming Things with Hashes. |
RFC |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Xudong Lv, Z. Jane Wang 0001 |
Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. |
IEEE Trans. Inf. Forensics Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Rass |
Dynamic Proofs of Retrievability from Chameleon-Hashes. |
SECRYPT |
2013 |
DBLP BibTeX RDF |
|
23 | Joel Young, Kristina Foster, Simson L. Garfinkel, Kevin D. Fairbanks |
Distinct Sector Hashes for Target File Detection. |
Computer |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Michael C. Turchin, Joel Hirschhorn |
Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples. |
Bioinform. |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Wesley Jin, Sagar Chaki, Cory F. Cohen, Arie Gurfinkel, Jeffrey Havrilla, Charles Hines, Priya Narasimhan |
Binary Function Clustering Using Semantic Hashes. |
ICMLA (1) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Markku-Juhani Olavi Saarinen |
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|