|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1026 occurrences of 508 keywords
|
|
|
Results
Found 1679 publication records. Showing 1679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau |
PKIX Certificate Status in Hybrid MANETs. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
Hybrid MANET, Certification, Risk, Public Key Infrastructure, Revocation |
17 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan |
A Property-Dependent Agent Transfer Protocol. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage |
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
debian, openssl, entropy, survey, attacks, prng |
17 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Enabling Attribute Delegation in Ubiquitous Environments. |
Mob. Networks Appl. |
2008 |
DBLP DOI BibTeX RDF |
attribute based authorization, delegation, federation |
17 | Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed |
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yasuo Miyakawa, Takashi Kurokawa 0001, Akihiro Yamamura, Yasushi Matsumoto |
Current Status of Japanese Government PKI Systems. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Bridge CA, Level of Assurance, Interoperability, Policies, Migration, eGovernment |
17 | Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path |
17 | Chung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang |
Security of Mobile Agent-Based Web Applications. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Philip J. Langlais |
An institutional model for the administration and support of multidisciplinary M&S graduate programs. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
multidisciplinary programs, program organizational model, modeling and simulation, graduate education |
17 | Kurt Dietrich, Johannes Winter |
Secure Boot Revisited. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil |
Using New Tools for Certificate Repositories Generation in MANETs. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Public-key management, MANETs |
17 | Richard O. Sinnott, Thomas Doherty, David B. Martin, Campbell Millar, Gordon Stewart 0002, John P. Watt |
Supporting Security-Oriented, Collaborative nanoCMOS Electronics Research. |
ICCS (1) |
2008 |
DBLP DOI BibTeX RDF |
Security, Grid computing, Virtual Organizations, Shibboleth, e-Research |
17 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
17 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
privacy, authenticated key exchange, secret handshakes |
17 | Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal |
Secure and efficient authentication in Wireless Mesh Networks using merkle trees. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Serge Vaudenay |
E-Passport Threats. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
Trust management for trusted computing platforms in web services. |
STC |
2007 |
DBLP DOI BibTeX RDF |
web services, trusted computing, properties, attestation |
17 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
17 | David W. Chadwick, Sean Anthony |
Using WebDAV for Improved Certificate Revocation and Publication. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
HTPP, revocation, LDAP, WebDAV, CRLs |
17 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
PKI-Based Authentication Mechanisms in Grid Systems. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee 0001 |
Key Establishment Scheme for Sensor Networks with Low Communication Cost. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen |
Batch Verification of Short Signatures. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim |
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Guowen Li, Jia Yu 0005, Rupeng Li, Daxing Li |
Two Threshold Multisignature Schemes from Bilinear Pairings. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
17 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
17 | Jon Ølnes, Leif Buene |
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Omar Batarfi, Lindsay F. Marshall |
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
17 | John F. Buford, Emré Celebi, Phyllis G. Frankl |
Property-Based Peer Trust in the Sleeper Service Discovery Protocol. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Fabio Picconi, Pierre Sens 0001 |
Using incentives to increase availability in a DHT. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yanqin Zhu, Peide Qian, Yueqin Liu |
A Role-based PMI Authentication Model and its Application. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Taekyoung Kwon 0002, Jung Hee Cheon, Yongdae Kim, Jaeil Lee |
Privacy Protection in PKIs: A Separation-of-Authority Approach. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | GeneBeck Hahn, Taekyoung Kwon 0002, Sinkyu Kim, JooSeok Song |
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Milan Markovic |
On Secure e-Health Systems. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
E-healthcare systems, Multilayered security systems, PKI systems, smart cards |
17 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Certificateless Designated Verifier Signature Schemes. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography |
17 | John Marchesini, Sean W. Smith |
Modeling Public Key Infrastructures in the Real World. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick |
A Heterogeneous Network Access Service Based on PERMIS and SAML. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Pablo A. Parrilo |
SOS Methods for Semi-algebraic Games and Optimization. |
HSCC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Silvano Dal-Zilio, Régis Gascon |
Resource Bound Certification for a Tail-Recursive Virtual Machine. |
APLAS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jun Wang, David Del Vecchio, Marty Humphrey |
Extending the Security Assertion Markup Language to Support Delegation for Web Services and Grid Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab |
CACMAN: A Framework for Efficient and Highly Available CA Services in MANETs. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Sye Loong Keoh, Emil Lupu |
An Efficient Access Control Model for Mobile Ad-Hoc Communities. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Salvatore Cristiano, Faye F. Liu |
On Splitting Public Keys for the Public Key Infrastructure. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
key-split, certificate, ecommerce, public key infrastructure (PKI) |
17 | Manuel V. Hermenegildo, Elvira Albert, Pedro López-García 0001, Germán Puebla |
Abstraction carrying code and resource-awareness. |
PPDP |
2005 |
DBLP DOI BibTeX RDF |
granularity control, mobile code certification, programming languages, abstract interpretation, program verification, distributed programming, program debugging, cost analysis, resource awareness |
17 | Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai |
Using Trust for Restricted Delegation in Grid Environments. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Wölfl |
Public-Key-Infrastructure Based on a Peer-to-Peer Network. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Patrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz |
Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Bilinear Pairing, Attack Model, Certificateless Cryptography, Certificateless Signature |
17 | Sara Sinclair, Sean W. Smith |
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Soomi Yang |
An Efficient Access Control Model Utilized the Attribute Certificate Structuring. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. |
Electron. Commer. Res. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Selwyn Russell |
Theory and benefits of recursive certificate structures. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Recursive certificate, Minimal set, Surplus set, Deficient set, Public key infrastructure, X.509 |
17 | Josep Domingo-Ferrer |
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
PKI and eCommerce, Certificate Directories, Coin-Based Payments, PayTree, Certificate Verification Trees, Protocols, Micropayments |
17 | Diego R. López, Chelo Malagon, Licia Florio |
TACAR: a Simple and Fast Way for Building Trust among PKIs. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
trust link, trust anchor, policy, Certificate, repository |
17 | Prashant Dewan, Partha Dasgupta |
Pride: peer-to-peer reputation infrastructure for decentralized environments. |
WWW (Alternate Track Papers & Posters) |
2004 |
DBLP DOI BibTeX RDF |
security, peer-to-peer, reputation systems |
17 | Manuel V. Hermenegildo, Elvira Albert, Pedro López-García 0001, Germán Puebla |
Some Techniques for Automated, Resource-Aware Distributed and Mobile Computing in a Multi-paradigm Programming System. |
Euro-Par |
2004 |
DBLP DOI BibTeX RDF |
granularity control, mobile code certification, GRIDs, resource awareness, distributed execution |
17 | Qingshui Xue, Zhenfu Cao |
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Vesselin Tzvetkov |
Disaster coverable PKI model based on Majority Trust principle. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Tao Jiang 0004, John S. Baras |
Ant-Based Adaptive Trust Evidence Distribution in MANET. |
ICDCS Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Albert Levi, Mahmut Özcan |
Practical and Secure E-Mail System (PractiSES). |
ADVIS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | David Aspinall 0001, Stephen Gilmore, Martin Hofmann 0001, Donald Sannella, Ian Stark |
Mobile Resource Guarantees for Smart Devices. |
CASSIS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Pablo A. Parrilo |
Sums of squares of polynomials and their applications. |
ISSAC |
2004 |
DBLP DOI BibTeX RDF |
semidefinite programming, convex optimization, multivariate polynomials, sum of squares |
17 | Yuh-Jong Hu |
Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. |
Electron. Commer. Res. |
2003 |
DBLP DOI BibTeX RDF |
agent-oriented PKI, agent-mediated e-commerce (AMEC), agent trust and delegation, FIPA standards, digital certificate |
17 | Pino Persiano, Ivan Visconti |
A secure and private system for subscription-based remote services. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
cryptographic algorithms and protocols, privacy, world-wide web, Access control, anonymity |
17 | Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle 0001, Laurentiu Leustean |
Certifying Optimality of State Estimation Programs. |
CAV |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sunil J. Noronha, Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle |
Architecture for Synchronous Multiparty Authentication Using Biometrics. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sattam S. Al-Riyami, Kenneth G. Paterson |
Certificateless Public Key Cryptography. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Ninghui Li, Wenliang Du, Dan Boneh |
Oblivious signature-based envelope. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Peter Lee 0001 |
What Are We Trying to Prove? Reflections on Experiences with Proof-Carrying Code. |
TACAS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Claude Crépeau, Carlton R. Davis |
A certificate revocation scheme for wireless ad hoc networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
revocation scheme, digital signature, public-key cryptography, ad hoc network security |
17 | He Huang, Shyhtsun Felix Wu |
An approach to certificate path discovery in mobile Ad Hoc networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
certificate path discovery, security, MANET, public key infrastructure |
17 | Xuhua Ding, Gene Tsudik |
Simple Identity-Based Cryptography with Mediated RSA. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
mediated RSA, revocation, Identity-based encryption |
17 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Public-Key Framework. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Cheun Ngen Chong, René van Buuren, Pieter H. Hartel, Geert Kleinhuis |
Security Attributes Based Digital Rights Management. |
IDMS/PROMS |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Eugenio Faldella, Marco Prandini |
A flexible scheme for on-line public-key certificate status updating and verification. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Kasun De Zoysa, Sead Muftic |
Bi-directional Web Document Protection System for Serious E-commerce Applications. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
17 | John DeTreville |
Binder, a Logic-Based Security Language. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Paul A. Gray, Vaidy S. Sunderam |
Certificate Use for Supporting Merging and Splitting of Computational Environments. |
HPCN |
2001 |
DBLP DOI BibTeX RDF |
Merging virtual machines, splitting virtual machines, soft-installation of processes, certificate revocation lists |
17 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Chuchang Liu, Maris A. Ozols, Anthony Cant |
An Axiomatic Basis for Reasoning about Trust in PKIs. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
CA (Certificate Authority), PKI (Public Key Infrastructure), trust theory, certificate verification, trust, information security, certificate |
17 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Giovanni Battista Barone, N. Margarita, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano |
Secure Access to Personalized Web Services. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Carl A. Gunter, Trevor Jim |
Generalized Certificate Revocation. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
17 | T. Mark A. Lomas |
I Cannot Tell a Lie (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Chuchang Liu, Maris A. Ozols, Marie Henderson, Anthony Cant |
Towards Certificate Verification in a Certificate Management System. |
ACSC |
2000 |
DBLP DOI BibTeX RDF |
CA (Certificate Authority), certificate management systems, certificate verification, formal methods, information security, certificate |
17 | Els Van Herreweghen |
Secure Anonymous Signature-Based Transactions. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Wu Wen |
A Delayed Commitment Scheme to Enhance Public Key Certificate Based Protocols. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Tuomas Aura |
Fast Access Control Decisions from Delegation Certificate Databases. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Audun Jøsang |
A Subjective Metric of Authentication. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Lane A. Hemaspaandra, Jörg Rothe, Gerd Wechsung |
Easy Sets and Hard Certificate Schemes. |
Acta Informatica |
1997 |
DBLP DOI BibTeX RDF |
|
15 | Serap Ergün |
Trading excess consumption certificates on the blockchain using the cooperative game theory. |
Kybernetes |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ali Salamati, Abolfazl Lavaei, Sadegh Soudjani, Majid Zamani 0001 |
Data-driven verification and synthesis of stochastic systems via barrier certificates. |
Autom. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Julian Pfeifle |
Positive Plücker tree certificates for non-realizability. |
Exp. Math. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yonghan Li, Chenyu Wu, Taoran Wu, Shijie Wang, Bai Xue 0001 |
Converse Barrier Certificates for Finite-time Safety Verification of Continuous-time Perturbed Deterministic Systems. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch |
How to Measure TLS, X.509 Certificates, and Web PKI: A Tutorial and Brief Survey. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1679 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|