To see the other types of publications on this topic, follow the link: AES CRYPTOGRAPHY.

Books on the topic 'AES CRYPTOGRAPHY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 books for your research on the topic 'AES CRYPTOGRAPHY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.

Full text
Abstract:
Symmetric encryption algorithms have been successfully used to protect information during transmission on an open channel. The classical approach to the synthesis of modern cryptographic algorithms and cryptographic primitives on which they are based, is the use of mathematical apparatus of Boolean functions. The authors demonstrate that the use to solve this problem of functions of multivalued logic (FML) allows to largely improve the durability of the cryptographic algorithms and to extend the used algebraic structures. On the other hand, the study of functions of multivalued logic in cryptography leads to a better understanding of the principles of cryptographic primitives and the emergence of new methods of describing cryptographic constructions. In the monograph the results of theoretical and experimental studies of the properties of the FML, the presented algorithms for generating high-quality S-blocks for the symmetric encryption algorithms, as well as full-working samples of the cryptographic algorithms ready for practical implementation. For students and teachers and all those interested in issues of information security.
APA, Harvard, Vancouver, ISO, and other styles
2

Taĭnopisʹ v risunkakh A.S. Pushkina: Razgadka koda genii︠a︡. Moskva: Pokolenie, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian) and international levels. A technological approach has been applied to the consideration of security issues in the global information space, within the framework of which the organizational, technical and legal principles of ensuring information security in cyberspace, as well as ways and means of ensuring security in the global information space have been studied. It is given not only an assessment of the level of use of funds, their interrelation and mutual complement, but also the legal characteristics of security tools in the global information space, for example cryptographic. The resources allocated for the implementation of the type of legal technology under study that were not previously allocated in the legal literature, for example, scientific and economic. The features of the protection of personal information on the Internet are considered, as well as modern problems of legal security in the global information environment, including cybersecurity in banking, healthcare, and biometric data security. The problems of international cooperation in the field of information security are highlighted. For a wide range of readers interested in information security issues. It can be useful for students, postgraduates and teachers of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
4

Alta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Edited by David Chantal 1964-, Lalín Matilde 1977-, and Manes Michelle 1970-. Providence, Rhode Island: American Mathematical Society, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Martin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.

Full text
Abstract:
This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.
APA, Harvard, Vancouver, ISO, and other styles
7

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Full text
Abstract:
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.

Full text
Abstract:
This chapter serves as an introduction to the environment in which cryptography finds common use today. We discuss the need for cryptography, as well as the basic language and concepts that are used to describe a cryptographic system. We introduce the core security services, such as confidentiality, data integrity, and authentication, which are delivered by cryptography in order to support modern security technologies. We introduce both symmetric and public-key cryptosystems, and discuss the differences between them. Finally, we consider ways in which cryptosystems can be attacked or compromised.
APA, Harvard, Vancouver, ISO, and other styles
9

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
APA, Harvard, Vancouver, ISO, and other styles
10

Bos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.

Full text
Abstract:
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra–Lenstra–Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
APA, Harvard, Vancouver, ISO, and other styles
11

Martin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.

Full text
Abstract:
This chapter considers mechanisms for providing entity authentication. We begin with a discussion on randomness and why it is important in cryptography. We compare several different techniques for generating randomness. We then consider the related issue of freshness and why it is important for entity authentication. We compare several different techniques for providing freshness. We then identify various different categories of identification information which can be used in an entity authentication mechanism. We look at the role cryptography plays in supporting basic entity authentication mechanisms such as passwords. We close by examining how cryptography can be used to provide more sophisticated forms of entity authentication through the use of dynamic passwords.
APA, Harvard, Vancouver, ISO, and other styles
12

Bolfing, Andreas. Cryptographic Primitives in Blockchain Technology. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198862840.001.0001.

Full text
Abstract:
Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism. As blockchain-based solutions will continue to revolutionize online applications in a growing digital market in the future, one needs to identify the principal opportunities and potential risks. Hence, it is unavoidable to learn the mathematical and cryptographic procedures behind blockchain technology in order to understand how such systems work and where the weak points are. The book provides an introduction to the mathematical and cryptographic concepts behind blockchain technologies and shows how they are applied in blockchain-based systems. This includes an introduction to the general blockchain technology approaches that are used to build the so-called immutable ledgers, which are based on cryptographic signature schemes. As future quantum computers will break some of the current cryptographic primitive approaches, the book considers their security and presents the current research results that estimate the impact on blockchain-based systems if some of the cryptographic primitive break. Based on the example of Bitcoin, it shows that weak cryptographic primitives pose a possible danger for the ledger, which can be overcome through the use of the so-called post-quantum cryptographic approaches which are introduced as well.
APA, Harvard, Vancouver, ISO, and other styles
13

Diffie, Whitfield, and Susan Landau. Privacy on the Line. The MIT Press, 1998. http://dx.doi.org/10.7551/mitpress/5571.001.0001.

Full text
Abstract:
A guide to the debate over cryptography policy and the implications for individual privacy. Telecommunication has never been perfectly secure, as a Cold War culture of wiretaps and international spying taught us. Yet many of us still take our privacy for granted, even as we become more reliant than ever on telephones, computer networks, and electronic transactions of all kinds. Whitfield Diffie and Susan Landau argue that if we are to retain the privacy that characterized face-to-face relationships in the past, we must build the means of protecting that privacy into our communication systems. Diffie and Landau strip away the hype surrounding the policy debate to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost.
APA, Harvard, Vancouver, ISO, and other styles
14

Tiwari, Sandip. Phenomena and devices at the quantum scale and the mesoscale. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198759874.003.0003.

Full text
Abstract:
Unique nanoscale phenomena arise in quantum and mesoscale properties and there are additional intriguing twists from effects that are classical in origin. In this chapter, these are brought forth through an exploration of quantum computation with the important notions of superposition, entanglement, non-locality, cryptography and secure communication. The quantum mesoscale and implications of nonlocality of potential are discussed through Aharonov-Bohm effect, the quantum Hall effect in its various forms including spin, and these are unified through a topological discussion. Single electron effect as a classical phenomenon with Coulomb blockade including in multiple dot systems where charge stability diagrams may be drawn as phase diagram is discussed, and is also extended to explore the even-odd and Kondo consequences for quantum-dot transport. This brings up the self-energy discussion important to nanoscale device understanding.
APA, Harvard, Vancouver, ISO, and other styles
15

Frank G, Madsen. Part I General Questions, 1 The Historical Evolution of the International Cooperation against Transnational Organised Crime: An Overview. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0001.

Full text
Abstract:
This chapter surveys the development of international criminal police cooperation and notes that originally most crimes now prohibited internationally were sponsored or tacitly allowed by governments. I postulate, using World Society Theory, that developing cooperation is part of global crime governance. In law enforcement cooperation ‘rationalization’ (a core concept of this theory) takes the form of policing technology. Interpol is the only global criminal-police cooperative organisation and, in developing this structure, police professionalism played a more decisive role than political or legal guidance. The chapter looks at three rarely highlighted themes of transnational organised crime (TOC): the relationship between the financial markets and TOC, organ transplants, and environmental or ‘green’ crime, as well as two procedural issues, random data collection and cryptography. The chapter ends by warning about two TOC areasthat will become of increasing concern: illicit disposal of toxic and e-waste, and the health care sector.
APA, Harvard, Vancouver, ISO, and other styles
16

Barnett, Stephen. Quantum Information. Oxford University Press, 2009. http://dx.doi.org/10.1093/oso/9780198527626.001.0001.

Full text
Abstract:
Quantum information- the subject- is a new and exciting area of science, which brings together physics, information theory, computer science and mathematics. Quantum Information- the book- is based on two successful lecture courses given to advanced undergraduate and beginning postgraduate students in physics. The intention is to introduce readers at this level to the fundamental, but offer rather simple, ideas behind ground-breaking developments including quantum cryptography, teleportation and quantum computing. The text is necessarily rather mathematical in style, but the mathematics nowhere allowed priority over the key physical ideas. My aim throughout was to be as complete and self- contained but to avoid, as far as possible, lengthy and formal mathematical proofs. Each of the eight chapters is followed by about forty exercise problems with which the reader can test their understanding and hone their skills. These will also provide a valuable resource to tutors and lectures. To request a copy of the Solutions Manual, visit: http://global.oup.com/uk/academic/physics/admin/solutions
APA, Harvard, Vancouver, ISO, and other styles
17

Kornicki, Peter. Eavesdropping on the Emperor. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197602805.001.0001.

Full text
Abstract:
Unlike the USA and Australia, Britain did nothing to prepare linguistically for war with Japan, so from December 1941 desperate measures were taken to train men and women in a hurry in a variety of courses. Those who learnt Japanese in this way went on to work as linguists, codebreakers, interrogators and translators. These courses were astoundingly successful, and the people chosen for them were brilliant and resourceful and many of them later had very distinguished careers. This book explains how it was done and what the linguists did with their skills – cryptography at Bletchley Park and at similar secret organizations in India, Mauritius and Australia, interrogating in the jungle, interpreting on the high seas and, eventually, policing the Occupation in Japan itself. It is a story of success against the odds under the pressure of wartime, and it is a story of remarkable people whose achievements have hitherto been neglected and kept secret.
APA, Harvard, Vancouver, ISO, and other styles
18

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Full text
Abstract:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.
APA, Harvard, Vancouver, ISO, and other styles
19

Lukas, Andre. The Oxford Linear Algebra for Scientists. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198844914.001.0001.

Full text
Abstract:
Abstract This book provides a introduction into linear algebra which covers the mathematical set-up as well as applications to science. After the introductory material on sets, functions, groups and fields, the basic features of vector spaces are developed, including linear independence, bases, dimension, vector subspaces and linear maps. Practical methods for calculating with dot, cross and triple products are introduced early on. The theory of linear maps and their relation to matrices is developed in detail, culminating in the rank theorem. Algorithmic methods bases on row reduction and determinants are discussed an applied to computing the rank and the inverse of matrices and to solve systems of linear equations. Eigenvalues and eigenvectors and the application to diagonalising linear maps, as well as scalar products and unitary linear maps are covered in detail. Advanced topics included are the Jordon normal form, normal linear maps, the singular value decomposition, bi-linear and sesqui-linear forms, duality and tensors. The book also included short expositions of diverse scientific applications of linear algebra, including to internet search, classical mechanics, graph theory, cryptography, coding theory, data compression, special relativity, quantum mechanics and quantum computing.
APA, Harvard, Vancouver, ISO, and other styles
20

Marks II, Robert J. Handbook of Fourier Analysis & Its Applications. Oxford University Press, 2009. http://dx.doi.org/10.1093/oso/9780195335927.001.0001.

Full text
Abstract:
Fourier analysis has many scientific applications - in physics, number theory, combinatorics, signal processing, probability theory, statistics, option pricing, cryptography, acoustics, oceanography, optics and diffraction, geometry, and other areas. In signal processing and related fields, Fourier analysis is typically thought of as decomposing a signal into its component frequencies and their amplitudes. This practical, applications-based professional handbook comprehensively covers the theory and applications of Fourier Analysis, spanning topics from engineering mathematics, signal processing and related multidimensional transform theory, and quantum physics to elementary deterministic finance and even the foundations of western music theory. As a definitive text on Fourier Analysis, Handbook of Fourier Analysis and Its Applications is meant to replace several less comprehensive volumes on the subject, such as Processing of Multifimensional Signals by Alexandre Smirnov, Modern Sampling Theory by John J. Benedetto and Paulo J.S.G. Ferreira, Vector Space Projections by Henry Stark and Yongyi Yang and Fourier Analysis and Imaging by Ronald N. Bracewell. In addition to being primarily used as a professional handbook, it includes sample problems and their solutions at the end of each section and thus serves as a textbook for advanced undergraduate students and beginning graduate students in courses such as: Multidimensional Signals and Systems, Signal Analysis, Introduction to Shannon Sampling and Interpolation Theory, Random Variables and Stochastic Processes, and Signals and Linear Systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Parkin, Jack. Money Code Space. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197515075.001.0001.

Full text
Abstract:
Newly emerging cryptocurrencies and blockchain technology present a challenging research problem in the field of digital politics and economics. Bitcoin—the first widely implemented cryptocurrency and blockchain architecture—seemingly separates itself from the existing territorial boundedness of nation-state money via a process of algorithmic decentralisation. Proponents declare that the utilisation of cryptography to advance financial transactions will disrupt the modern centralised structures by which capitalist economies are currently organised: corporations, governments, commercial banks, and central banks. Allegedly, software can create a more stable and democratic global economy; a world free from hierarchy and control. In Money Code Space, Jack Parkin debunks these utopian claims by approaching distributed ledger technologies as a spatial and social problem where power forms unevenly across their networks. First-hand accounts of online communities, open-source software governance, infrastructural hardware operations, and Silicon Valley start-up culture are used to ground understandings of cryptocurrencies in the “real world.” Consequently, Parkin demonstrates how Bitcoin and other blockchains are produced across a multitude of tessellated spaces from which certain stakeholders exercise considerable amounts of power over their networks. While money, code, and space are certainly transformed by distributed ledgers, algorithmic decentralisation is rendered inherently paradoxical because it is predicated upon centralised actors, practices, and forces.
APA, Harvard, Vancouver, ISO, and other styles
22

Iordanou, Ioanna. Venice's Secret Service. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198791317.001.0001.

Full text
Abstract:
According to conventional wisdom, systematized intelligence and espionage are ‘modern’ phenomena. This book overturns this academic orthodoxy, recounting the arresting story of the world’s earliest centrally organized state intelligence organization, created in Renaissance Venice. Headed by the infamous Council of Ten, Renaissance Venice’s intelligence service resembled a public sector institution that operated with remarkable corporate-like complexity and maturity, serving prominent intelligence functions, which included operations (intelligence and covert action), analysis, cryptography, steganography, cryptanalysis, and even the development of lethal substances such as poison. The book details Renaissance Venice’s systematic attempts to organize and manage a central intelligence service made up of innumerable state servants, official informants, and amateur spies, who, dispatched across Europe, Anatolia, and Northern Africa, conducted Venice’s stealthy intelligence operations. Exploring secrecy as a vehicle of knowledge exchange that fostered identities, alliances, and divisions, the book also reveals Venice’s fabled department of professional cryptology, and recounts some of the extraordinary measures deployed by the Venetian authorities in their ongoing effort to maintain the security of the Venetian state. These included tortures, assassinations, and chemical warfare. Overall, the book not only reveals a plethora of secrets, their keepers, and their seekers but explores the social and managerial processes that enabled their existence and furnished the foundation for an extraordinary intelligence organization. For this reason, Renaissance Venice’s central intelligence apparatus is explored and analysed as an organization rather than as the capricious intelligence enterprise of a group of state dignitaries, as was the case for other Italian and European states.
APA, Harvard, Vancouver, ISO, and other styles
23

Freire, Olival, ed. The Oxford Handbook of the History of Quantum Interpretations. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780198844495.001.0001.

Full text
Abstract:
Quantum mechanics approaches its centenary with an impressive record. It became the backbone of most research in physics, led to applications such as the transistor and laser, and prompted an upheaval in the philosophy of science. Its scope and its precision have been constantly growing, and it is now promising more powerful computers and safer cryptography. This century of conquests has also been a time of ongoing debates about the foundations and interpretation of the theory, which has been referred to as the quantum controversy. The controversy has been unusually long and remains open. Jammer called it “a story without an ending” and Laloë described this coexistence of successes and doubts with the metaphor of the colossus with feet of clay. This Handbook is a survey on this history. Some of the so-called “interpretations” are not interpretations of a fixed formalism, they are different theories, thus it has been a debate about the interpretations and the foundations of quantum mechanics. In this volume, the “history of interpretations” is used for the sake of brevity. The successive parts of the Handbook deal with the scientific and philosophical issues under debate, historical landmarks, places and contexts, historical and philosophical theses, and the proliferation of interpretations. This Handbook may serve those interested in the history of quantum mechanics and those who are engaged with, or attracted by current research on quantum information, as it may give them a flavor of the history that led to or lay the groundwork for the current investigations.
APA, Harvard, Vancouver, ISO, and other styles
24

Van Raalte, Theodore. Antoine de Chandieu. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190882181.001.0001.

Full text
Abstract:
The first study in any language dedicated to the influential theological publications of Antoine de Chandieu begins by introducing us to the memory of Chandieu as it was at Theodore Beza’s death. Poets in Geneva mourned the end of an era of star theologians by reminiscing about Geneva’s Reformed triumvirate of gold, silver, and bronze: gold represented Calvin (d. 1564); silver Chandieu (d. 1591); and bronze Beza (d. 1605). The present work sets Chandieu within the context of Reformed theology in Geneva, the wider history of scholastic method in the Swiss cantons, and the gripping social and political milieus. The book shows why Chandieu developed a very elaborate form of the medieval quaestio disputata and made liberal use of hypothetical syllogisms. Chandieu was far from a mere ivory-tower theologian: as a member of French nobility in possession of many estates in France, he and his family acutely experienced the misery and triumph of the French Huguenots during the Wars of Religion. Connected to royalty from at least the beginning of his career, Chandieu later served the future Henry IV as personal military chaplain and cryptographer. His writings range from religious poetry (put to music by others in his own lifetime) to carefully crafted disputations that saw publication in his posthumous Opera Theologica in five editions between 1592 and 1620. The book argues that Chandieu utilized scholastic method in theology for the sake of clarity of argument, rootedness in Scripture, and certainty of faith.
APA, Harvard, Vancouver, ISO, and other styles
25

(Editor), Paul C. Rosier, ed. Code Talkers and Warriors: Native Americans and World War II (Landmark Events in Native American History). Chelsea House Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography