|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Juraj Hromkovic |
Randomized Communication Protocols (A Survey). |
SAGA |
2001 |
DBLP DOI BibTeX RDF |
two-party protocols, communication complexity, Randomized computing |
21 | Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori |
Support System for Constructing Communication Services and Protocols Based on Compositional Approach. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
communication service design, communication protocol design, compositional approach, sequential composition, protocols, LOTOS, service specifications, protocol specifications, parallel composition |
21 | Hisaaki Katagiri, Keiichi Yasumoto, Akira Kitajima, Teruo Higashino, Kenichi Taniguchi |
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization. |
DAC |
2000 |
DBLP DOI BibTeX RDF |
concurrent EFSMs, mutli-way synchronization, high-level synthesis, communication protocols, LOTOS, Lotos |
21 | Mustaque Ahamad, Rammohan Kordale |
Scalable Consistency Protocols for Distributed Services. |
IEEE Trans. Parallel Distributed Syst. |
1999 |
DBLP DOI BibTeX RDF |
Scalable services, caching, replication, distributed objects, consistency protocols |
21 | Purnendu Sinha, Neeraj Suri |
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols. |
RTSS |
1999 |
DBLP DOI BibTeX RDF |
Dependable Real-time Protocols, Scheduling, Formal Techniques |
21 | Colin Boyd |
A Class of Flexible and Efficient Key Management Protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
authentication, key management, secure protocols |
21 | K. H. Kim, Carlos Serro |
Can Real-Time Local Area Network Protocols Be Made Robust? |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
CSMA/DCR protocol, Robust real-time protocols, Real-time Local Area Networks, Temporary fault, Link failure, Permanent fault |
21 | Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury |
Towards Human-Centric Endpoint Security (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Hugenroth |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Agata Kruzikova |
Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Jonathan Anderson |
Blind Auditing and Probabilistic Access Controls. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Agata Kruzikova, Vashek Matyas, Milan Broz |
Authentication of IT Professionals in the Wild - A Survey. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Adrian Perrig, David A. Basin |
Determining an Economic Value of High Assurance for Commodity Software Security. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing |
One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Christelle Gloor |
Trusted Introductions for Secure Messaging (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid |
Towards Human-Centric Endpoint Security. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Harry Halpin |
Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Adrian Perrig |
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Christelle Gloor, Adrian Perrig |
Trusted Introductions for Secure Messaging. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing, Ross Anderson 0001 |
One Protocol to Rule Them All? On Securing Interoperable Messaging. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jessica Monteith |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Harry Halpin, Andrei Serjantov |
Incentives and Censorship Resistance for Mixnets Revisited. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Dougherty, José Meseguer 0001, Sebastian Alexander Mödersheim, Paul D. Rowe (eds.) |
Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, Shriram Krishnamurthi |
Prototyping Formal Methods Tools: A Protocol Analysis Case Study. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | John D. Ramsdell |
Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Prajna Bhandary, Edward Zieglar, Charles Nicholas |
Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Riccardo Focardi, Flaminia L. Luccio |
Secure Key Management Policies in Strand Spaces. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do 0001, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele |
A Tutorial-Style Introduction to DY*. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Pierpaolo Degano, Letterio Galletta, Selene Gerali |
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Kangsoo Jung, Sayan Biswas, Catuscia Palamidessi |
Establishing the Price of Privacy in Federated Data Trading. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Daniel J. Dougherty |
Model Finding for Exploration. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Alessandra Di Pierro, Massimiliano Incudini |
Quantum Machine Learning and Fraud Detection. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
On the Complexity of Verification of Time-Sensitive Distributed Systems. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad M. Ahmadpanah, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld |
Securing Node-RED Applications. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dale M. Johnson |
Formal Methods and Mathematical Intuition. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson |
Benign Interaction of Security Domains. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sebastian Mödersheim, Jorge Cuéllar |
Three Branches of Accountability. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark |
A Declaration of Software Independence. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dusko Pavlovic |
Probabilistic Annotations for Protocol Models - Dedicated to Joshua Guttman. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Principles of Remote Sattestation. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sylvan Pinsky |
Joshua Guttman: Pioneering Strand Spaces. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Damián Aparicio-Sánchez, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001, Julia Sapiña |
Protocol Analysis with Time and Space. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Paul D. Rowe |
On Orderings in Security Models. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás (eds.) |
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers |
Security Protocols Workshop |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Joshua D. Guttman, Carl E. Landwehr, José Meseguer 0001, Dusko Pavlovic (eds.) |
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza |
Symbolic Timed Trace Equivalence. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan K. Millen |
A Long, Slow Conversation. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson |
Finding Intruder Knowledge with Cap-Matching. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer |
Enrich-by-Need Protocol Analysis for Diffie-Hellman. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Key Reminiscences. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Véronique Cortier, Pierrick Gaudry, Stéphane Glondu |
Belenios: A Simple Private and Verifiable Electronic Voting System. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Matteo Busi 0001, Pierpaolo Degano, Letterio Galletta |
Robust Declassification by Incremental Typing. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider |
JRIF: Reactive Information Flow Control for Java. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sylvan Pinsky |
Cathy Meadows: A Central Figure in Protocol Analysis. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Santiago Escobar 0001, José Meseguer 0001 |
Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Chan Nam Ngo |
Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Prashant Anantharaman |
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Laurent Chuat |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Laurent Chuat, Sarah Plocher, Adrian Perrig |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vijay Kothari, Michael C. Millian |
Human-Computability Boundaries (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sasa Radomirovic |
Shaping Our Mental Model of Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith |
Mismorphism: The Heart of the Weird Machine. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lydia Kraus |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith |
Human-Computability Boundaries. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Diana A. Vasile |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sasa Radomirovic |
Shaping Our Mental Model of Security (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Maverick Woo |
Requirements for Root of Trust Establishment. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Graham Rymer, David Llewellyn-Jones |
Raven Authentication Service - Attacks and Countermeasures. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Kat Krol |
Intentionality and Agency in Security (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Daniel J. Weitzner |
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | T. Mark A. Lomas |
User Authentication for the Internet of Things (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Patrick McCorry, Malte Möser, Syed Taha Ali |
Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Patrick McCorry |
Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Taciane Martimiano, Jean Everson Martina |
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Ross Anderson 0001, Ilia Shumailov, Mansoor Ahmed-Rengers |
Making Bitcoin Legal. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano |
Intentionality and Agency in Security. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|