|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 67 occurrences of 51 keywords
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
217 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Multiparty nonrepudiation: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 41(1), pp. 5:1-5:43, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multiparty applications, nonrepudiation, multiparty protocols |
76 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 1002-1010, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
46 | Giampaolo Bella, Lawrence C. Paulson |
Accountability protocols: Formalized and verified. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(2), pp. 138-161, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
inductive method, proof tools, Isabelle, Nonrepudiation, certified email |
46 | Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Development of Secure Internet Applications for Governmental Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 362-368, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation |
40 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2006) and Workshops, 26-29 June 2006, Palo Alto, California, USA, pp. 18, 2006, IEEE Computer Society, 0-7695-2511-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Asad Ullah Khan, Nadeem Javaid, Muhammad Asghar Khan, Insaf Ullah |
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 26(2), pp. 945-960, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Tuan-Vinh Le, Chien-Lung Hsu, Wei-Xin Chen |
A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(9), pp. 5771-5782, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Guruprakash Jayabalasamy, Srinivas Koppu |
High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B), pp. 9677-9687, November 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Chin-Ling Chen, Tsai-Tung Yang, Yong-Yuan Deng, Chi-Hua Chen |
A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 32(5), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Yang Xu 0013, Ju Ren 0001, Guojun Wang 0001, Cheng Zhang, Jidian Yang, Yaoxue Zhang |
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 15(6), pp. 3632-3641, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, Yu-Wei Lin |
Fulfilling mutual nonrepudiation for cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 28(3), pp. 583-599, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda |
Nonrepudiation Protocols Without a Trusted Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETYS ![In: Networked Systems - 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised Selected Papers, pp. 1-15, 2016, Springer, 978-3-319-46139-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han |
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings, pp. 3-18, 2016, 978-3-319-47421-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda |
Two-phase Nonrepudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, ICCCNT 2016, Dallas, TX, USA, July 6-8, 2016, pp. 22:1-22:8, 2016, ACM, 978-1-4503-4179-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Mohamed G. Gouda |
Nonrepudiation Protocols in Cloud Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, ICCCNT 2016, Dallas, TX, USA, July 6-8, 2016, pp. 23:1-23:6, 2016, ACM, 978-1-4503-4179-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang |
A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 439-446, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jason King |
Measuring the forensic-ability of audit logs for nonrepudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013, pp. 1419-1422, 2013, IEEE Computer Society, 978-1-4673-3076-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | |
Nonrepudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 854, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Mike Just |
Nonrepudiation of Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 852-854, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Panagiota Lagou, Gregory Chondrokoukis |
Choosing a Biometric for Nonrepudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 20(1), pp. 17-24, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Panagiota Lagou, Gregory Chondrokoukis |
Survey on Nonrepudiation: Digital Signature Versus Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 18(5), pp. 257-266, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes, pp. 307-313, 2009, CSREA Press, 1-60132-126-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
29 | Ana Isabel González-Tablas Ferreres, A. Orfila Ramos, Arturo Ribagorda |
EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Based Learn. Teach. Technol. ![In: Int. J. Web Based Learn. Teach. Technol. 3(1), pp. 21-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ayman Haggag, Mohamed Ghoneim, Jianming Lu, Takashi Yahagi |
Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(11), pp. 2945-2954, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Randy Sabett |
Nonrepudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chien-Lung Hsu, Tzong-Sun Wu |
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 164(1), pp. 201-225, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jianying Zhou 0001 |
Achieving Fair Nonrepudiation in Electronic Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Organ. Comput. Electron. Commer. ![In: J. Organ. Comput. Electron. Commer. 11(4), pp. 253-267, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Hung-Yu Lin, Lein Harn |
Authentication protocols with nonrepudiation services in personal communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 3(8), pp. 236-238, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Kwei-Jay Lin, Joe Zou, Yan Wang 0002 |
Accountability Computing for E-society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 34-41, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
service accountability, security, quality of service, service-oriented architecture, trust, disclosure, liability, nonrepudiation |
26 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 66-77, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
26 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
26 | Jianying Zhou 0001, Dieter Gollmann |
A Fair Non-repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 55-61, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party |
20 | A. Selcuk Uluagac, Christopher P. Lee 0001, Raheem A. Beyah, John A. Copeland |
Designing Secure Protocols for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 503-514, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security in Wireless Sensor Networks, Security Services for Wireless Sensor Networks, Wireless Sensor Networks |
20 | Gwan-Hwan Hwang, Yu-Hsuan Chang, Tao-Ku Chang |
An Operational Model and Language Support for Securing Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 463-470, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ki-Woong Park, Hyunchul Seok, Kyu Ho Park |
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 105-112, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Gianluigi Me, Maurizio Adriano Strangio, Alexander Schuster |
Mobile Local Macropayments: Security and Prototyping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 5(4), pp. 94-100, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
personal trusted device, ECIES, security, Java, handheld, payment |
20 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 21-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
20 | Peter Gutmann, David Naccache, Charles C. Palmer |
When Hashes Collide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(3), pp. 68-71, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptography, hashes, scripts |
20 | M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham |
Fair BPEL Processes Transaction using Non-Repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2005 IEEE International Conference on Services Computing (SCC 2005), 11-15 July 2005, Orlando, FL, USA, pp. 337-342, 2005, IEEE Computer Society, 0-7695-2408-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Carlo Blundo, Stelvio Cimato |
A Software Infrastructure for Authenticated Web Metering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 37(4), pp. 28-33, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
A2cast: an adaptive source authentication protocol for multicast streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 363-368, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Omaima Bamasak, Ning Zhang 0001 |
A secure proxy signature protocol for agent-based M-commerce applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 399-406, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Hassen Saïdi, Victoria Stavridou, Bruno Dutertre |
Protocol Codesign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 106-113, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Sung-Cheal Byun, Byung-Ha Ahn |
Symmetric and Asymmetric Cryptography Based Watermarking Scheme for Secure Electronic Commerce via the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 607-612, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ross J. Anderson, Michael Roe |
The GCHQ Protocol and Its Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 134-148, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|