Academic literature on the topic 'Client certificate'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Client certificate.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Client certificate"

1

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Full text
Abstract:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstr
APA, Harvard, Vancouver, ISO, and other styles
2

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption." International Journal of Information Security and Privacy 6, no. 2 (2012): 64–94. http://dx.doi.org/10.4018/jisp.2012040105.

Full text
Abstract:
The authors propose a Secure and Optimized Mobile based Merchant Payment (SOMMP) Protocol using Signcryption scheme with Forward Secrecy (SFS) based on elliptic curve which consumes less computational and communication cost. In SOMMP client sends message in the form of TransCertC (Transaction Certificate) which is a X.509 SLC (X.509 Short Lived Certificate) thereby reducing the client interactions with the engaging parties thereby reducing the consumption of resources (from Client’s perspective) which are very scarce in Resource Constrained Devices like Mobile Phones. In SOMMP protocol WSLC (W
APA, Harvard, Vancouver, ISO, and other styles
3

Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.

Full text
Abstract:
Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced E
APA, Harvard, Vancouver, ISO, and other styles
4

Boyen, Xavier, Udyani Herath, Matthew McKague, and Douglas Stebila. "Associative Blockchain for Decentralized PKI Transparency." Cryptography 5, no. 2 (2021): 14. http://dx.doi.org/10.3390/cryptography5020014.

Full text
Abstract:
The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single point
APA, Harvard, Vancouver, ISO, and other styles
5

Alnatsheh, Essam. "The Efficient Use of a List of Trusted Certificate Authorities." International Journal of Engineering Technology and Sciences 5, no. 3 (2018): 118–31. http://dx.doi.org/10.15282/ijets.v5i3.1135.

Full text
Abstract:
Nowadays, many Certificate Authorities (CAs) that issue certificates may or may not be trusted because not all CAs are reliable and trustworthy. University laboratories and computers of its people (students, lecturer and staff) are thus susceptible to the risk resulting from this mistrust. This study proposes a university owned notary server, which will be managed by the university, to solve the problem using a Certificate Trust List (CTL). Simply put, when students and others use the Web, the notary server checks the certificate to see whether a conflict exists and verifies the signatures and
APA, Harvard, Vancouver, ISO, and other styles
6

Sebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.

Full text
Abstract:
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server li
APA, Harvard, Vancouver, ISO, and other styles
7

Budi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.

Full text
Abstract:
Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level
APA, Harvard, Vancouver, ISO, and other styles
8

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Full text
Abstract:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network conne
APA, Harvard, Vancouver, ISO, and other styles
9

Wibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.

Full text
Abstract:
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate valida
APA, Harvard, Vancouver, ISO, and other styles
10

Mohamad, Imad, and Aws Abdulsahib. "A Framework Prototype for E-Authentication of Iraqi Civil-Identity Certificate." Iraqi Journal for Computers and Informatics 41, no. 1 (2014): 20–25. http://dx.doi.org/10.25195/ijci.v41i1.93.

Full text
Abstract:
The increasing needs for Iraqi citizens in getting the advantages of e-government services, administration anddemocracy motivates us to study and look for how to expand the e-government project of Iraq with new e-services. Theproposed framework considers a realistic problem in Iraq called the identity of the Civil Status. It verifies the (identity)validity of issued electronically instead of paperwork which takes significant time and effort to complete the transaction. Anelectronic interface is designed for the sake of the proposed framework using client-server approach assisted by PHP andMySQ
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Client certificate"

1

Ellgren, Robin, and Tobias Löfgren. "Distributed Client Driven Certificate Transparency Log." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148693.

Full text
Abstract:
High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. The main idea is to append all certificates to a publicly visible log, which anyone can monitor to check for suspicious activity. Although this is a great initiative for needing to rely less on CAs, the logs are still centralized and run by large companies. Therefore, in this thesis, in order to make
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Jing. "Flexible Certificate Management for Secure HTTPS Client/Server Communication." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4135.

Full text
Abstract:
<p>Certificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has looked at the actual user requirements for the system and how users can use the system conveniently and practically, which is actually a very important factor for the whole security system to work properly and to be widely accepted.</p><p>In this thesis we have designed a framework that pr
APA, Harvard, Vancouver, ISO, and other styles
3

Leijon, Jon. "A mobile gateway for medical auscultation : Enhanced Client Certificate Authentication and MTLS Security." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-126909.

Full text
Abstract:
Attempting to re-engineer a telemedicine application, this report sets out to make a cheap yet robust solution that is portable and easy to use. It will be a Inera compliant system using Android that authenticates in a secure way with a .NET server behind F5 full proxy.The report begins with a background to telemedicine, and a technical specification that might fulfill the demands of privacy laws regarding health care records. The focus of the report moves on to inspects the choices for authentication. The results consists of formulating a possible solution for authentication by self signed cl
APA, Harvard, Vancouver, ISO, and other styles
4

Dotzky, Jesper, and Jon Wiklund. "Extern Web-service-lösning vid SSAB Tunnplåt i Borlänge- för kommunikation med sina distributions lager." Thesis, Högskolan Dalarna, Informatik, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:du-401.

Full text
Abstract:
Detta examensarbete har utförts på SSAB- Tunnplåt i Borlänge under vårterminen 2004 och omfattar 10 veckors arbete.SSAB sköter idag sin kommunikation med distributionslagren via fax, telefon eller e-post. Eftersom detta är ett ganska tidskrävande kommunikationssätt, vill SSAB ha en smidigare och snabbare kommunikationslösning. Den lösning som SSAB vill ha är en extern Web-service-lösning för att upprätta en säker kommunikation med sina distributionslager.Parallellt med byggandet av Web-service-lösningen arbetades en förvaltningsmodell fram. Den beskriver hur förvaltningsorganisationen med dess
APA, Harvard, Vancouver, ISO, and other styles
5

Maywah, Andrew J. (Andrew James) 1977. "An implementation of a secure web client using SPKI/SDSI certificates." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86534.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (leaves 74-76).<br>by Andrew J. Maywah.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

O'Neill, Mark Thomas. "The Security Layer." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7761.

Full text
Abstract:
Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other featur
APA, Harvard, Vancouver, ISO, and other styles
7

Au, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.

Full text
Abstract:
The enormous growth of the Internet and the World Wide Web has provided the opportunity for an enterprise to extend its boundaries in the global business environment. While commercial functions can be shared among a variety of strategic allies - including business partners and customers, extranets appear to be the cost-effective solution to providing global connectivity for different user groups. Because extranets allow third-party users into corporate networks, they need to be extremely secure and external access needs to be highly controllable. Access control and authorisation mechanisms
APA, Harvard, Vancouver, ISO, and other styles
8

Hernández, Dorador Catherine Dina, Erica Yukiko Nishihara, and Sierralta Cristhian Antonio Sierralta. "Plan de negocios para la creación de un laboratorio Analítico certificado." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2011. http://hdl.handle.net/10757/622474.

Full text
Abstract:
El presente ensayo, da a conocer una oportunidad de negocio, la cual se ha identificado con la futura ejecución del nuevo Reglamento de la “Ley de los Productos Farmacéuticos, Dispositivos Médicos y Productos Sanitarios N°29459”, que entrara en vigencia a partir del 28 de Enero del 2012, en nuestro país. La empresa propuesta brindará servicio de análisis fisicoquímicos y microbiológicos de productos farmacéuticos, principalmente de consumo humano. La cual se enfocara a satisfacer al cliente en el cumpliendo de los análisis en el menor tiempo posible y de acuerdo a las necesidades del cliente r
APA, Harvard, Vancouver, ISO, and other styles
9

Trudel, Jaclin. "Analyse des motivations des clients pour le choix d'une institution financière dans l'achat d'un certificat de placement garanti ou d'un dépôt à terme /." Thèse, Rouyn-Noranda : Université du Québec en Abitibi-Témiscamingue, 1995. http://theses.uqac.ca.

Full text
Abstract:
Mémoire (M.P.M.O.)--Université du Québec en Abitibi-Témiscamingue, 1995.<br>Mémoire réalise à l'Université du Québec en Abitibi-Témiscamingue dans le cadre du programme de maîtrise en gestion des petites et moyennes organisations de l'Université du Québec à Chicoutimi extensionné à l'Université du Québec en Abitibi-Témiscamingue. CaQCU Document électronique également accessible en format PDF. CaQCU
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Marcos Antonio de. "Monitoramento da satisfação de cliente em contexto business-to-business: um survey em empresas com certificado ISO 9001-2000 no Estado de São Paulo." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3136/tde-28042009-173139/.

Full text
Abstract:
O objetivo deste trabalho é identificar como as empresas que operam no contexto business-to-business realizam o monitoramento da satisfação de seus clientes. O tema é bastante relevante no cenário atual, em que as empresas investem quantias significativas em diversos programas de melhoria e possuem grandes dificuldades para avaliar se tais programas impactam na satisfação de seus clientes e, por conseqüência, na sua fidelização. Para tanto, foi realizada uma avaliação de bibliografia disponível, principalmente aquelas provenientes das áreas de marketing e gestão de qualidade. A metodologia ado
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Client certificate"

1

Code, Michael. The role of the independent lawyer and security certificates. Faculty of Law, University of Toronto, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Financial Planning Certificate - FP3: Identifying and Satisfying Client Needs: Exams: Through to April 2003: Text and Kit Set (2002). BPP Business Education Ltd, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Financial Planning Certificate - FP3: Identifying and Satisfying Client Needs: Exam Dates Up to July 2002: Text and Kit Set (2001). BPP Publishing Ltd, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Client certificate"

1

goo Kim, Jeom, Yoochan Ra, and Jaehwan Lim. "Certificate Management Client System for E-transactions on Internet." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44864-0_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rajathi, N., and Meghna Praveen. "Practical Implementation and Analysis of TLS Client Certificate Authentication." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8443-5_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Papapanagiotou, K., K. Markantonakis, Q. Zhang, W. G. Sirett, and K. Mayes. "On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation." In Security and Privacy in the Age of Ubiquitous Computing. Springer US, 2005. http://dx.doi.org/10.1007/0-387-25660-1_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kwak, Jin, Seungwoo Lee, Soohyun Oh, and Dongho Won. "Real-time Certificate Validation Service by Client’s Selective Request." In Intelligent Systems Design and Applications. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-44999-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Massonet, Philippe, Arnaud Michot, Syed Naqvi, Massimo Villari, and Joseph Latanicki. "Securing the External Interfaces of a Federated Infrastructure Cloud." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch082.

Full text
Abstract:
This chapter describes an open source solution for securing the Claudia service manager and the OpenNebula virtual execution environment manager when combined in a federated RESERVOIR architecture. The security services provide confidentiality, authentication, and integrity by securing the external API. The chapter describes how to integrate the security solution in an open source cloud computing system, how to install it, and provides an illustrative case study showing its potential for the community. The aim of the chapter is to help those who want to build their own secure infrastructure clouds. The open source security code provides mutual authentication between clients and the Claudia service manager, and secures the SMI interface with role based access control. The same security services can also secure the VMI with role based access control and X509 certificates. Finally the federation can be secured by combining an LDAP server to manage the federation and XACML security policies, and using policy matching to guarantee the respect of security policies within the federation.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Client certificate"

1

Parsovs, Arnis. "Practical Issues with TLS Client Certificate Authentication." In Network and Distributed System Security Symposium. Internet Society, 2014. http://dx.doi.org/10.14722/ndss.2014.23036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Niizuma, Tomo, and Hideaki Goto. "Centralized Online Sign-Up and Client Certificate Issuing System for Eduroam." In 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2014. http://dx.doi.org/10.1109/compsacw.2014.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Heesun, and Stan Redford. "Client certificate and IP address based multi-factor authentication for J2EE web applications." In the 2007 conference of the center for advanced studies. ACM Press, 2007. http://dx.doi.org/10.1145/1321211.1321229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wachs, Matthias, Quirin Scheitle, and Georg Carle. "Push away your privacy: Precise user tracking based on TLS client certificate authentication." In 2017 Network Traffic Measurement and Analysis Conference (TMA). IEEE, 2017. http://dx.doi.org/10.23919/tma.2017.8002897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xia, Wei, Mingxin Cui, Wei Wang, et al. "Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild." In 2021 28th International Conference on Telecommunications (ICT). IEEE, 2021. http://dx.doi.org/10.1109/ict52184.2021.9511513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mitkus, Sigitas, and Dalia Averkienė. "Legal significance of construction documents: consequences of non-implementation of contractual regulations for the client and the contractor in Lithuania." In Contemporary Issues in Business, Management and Economics Engineering. Vilnius Gediminas Technical University, 2019. http://dx.doi.org/10.3846/cibmee.2019.068.

Full text
Abstract:
Purpose – the article discusses the construction documents and their significance enshrined in Contractual Regulations and aims to disclose the consequences of the preparation or non-preparation of the construction documents for the client and the contractor. For this purpose, the general features of construction documents shall be reviewed first, and the certificate of acceptance of construction work and reports shall be analyzed separately. Findings – the results of the study state that in client/contractor relationship, the rights and duties between the participants to a construction projec
APA, Harvard, Vancouver, ISO, and other styles
7

Cruz de Oliveira, Elcio, and Paula Fernandes de Aguiar. "Evaluation of the Uncertainty in Measurement Versus the Limit of Specification: Qualitative and Quantitative Aspects of Compliance." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0302.

Full text
Abstract:
In many cases, the declaration of compliance of a result of measurement is not clear. This is observed when there is a partial superposition of the expanded uncertainty of a quantity with its limit of specification. In these cases, a judgment is required based in pre-established criteria between the client and the supplier. The consequences of an inadequate decision may be disastrous. Either the supplier will have financial losses or it will lose credibility with its client. This work demonstrates how to calculate the probability, for an appropriate confidence level, that the uncertainty assoc
APA, Harvard, Vancouver, ISO, and other styles
8

Oakes, Edward, Jeffery Kline, Aaron Cahn, Keith Funkhouser, and Paul Barford. "A Residential Client-side Perspective on SSL Certificates." In 2019 Network Traffic Measurement and Analysis Conference (TMA). IEEE, 2019. http://dx.doi.org/10.23919/tma.2019.8784633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kinoshita, Shunichi, Toshiki Watanabe, Yasuhiro Yamasaki, Hideaki Goto, and Hideaki Sone. "Fault-Tolerant Wireless LAN Roaming System Using Client Certificates." In 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2013. http://dx.doi.org/10.1109/compsac.2013.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Client certificate"

1

Campbell, B., J. Bradley, N. Sakimura, and T. Lodderstedt. OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

The role of incentives in encouraging workplace HIV/AIDS policies and programs. Population Council, 2004. http://dx.doi.org/10.31899/hiv15.1007.

Full text
Abstract:
This brief examines the role of incentives in encouraging companies in Thailand to adopt workplace policies and programs that address AIDS-related stigma and discrimination and respond to the needs of workers for information and services. The research was a collaboration between the Horizons Program, American International Assurance (AIA), the Thailand Business Coalition on AIDS (TBCA), and AusAID. After the initiative was launched (known as the AIDS-response Standard Organization), TBCA staff built relationships with company managers to explain and promote the advantages of joining. Companies
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!