Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Network Address Translation (NAT).

Thèses sur le sujet « Network Address Translation (NAT) »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 20 meilleures thèses pour votre recherche sur le sujet « Network Address Translation (NAT) ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

O'Neal, Matthew R. « A design comparison between IPv4 and IPv6 in the context of MYSEA, and implementation of an IPv6 MYSEA prototype ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FONeal.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 49-50). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Chowdhury, Farida. « Structured peer-to-peer overlays for NATed churn intensive networks ». Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/23038.

Texte intégral
Résumé :
The wide-spread coverage and ubiquitous presence of mobile networks has propelled the usage and adoption of mobile phones to an unprecedented level around the globe. The computing capabilities of these mobile phones have improved considerably, supporting a vast range of third party applications. Simultaneously, Peer-to-Peer (P2P) overlay networks have experienced a tremendous growth in terms of usage as well as popularity in recent years particularly in fixed wired networks. In particular, Distributed Hash Table (DHT) based Structured P2P overlay networks offer major advantages to users of mobile devices and networks such as scalable, fault tolerant and self-managing infrastructure which does not exhibit single points of failure. Integrating P2P overlays on the mobile network seems a logical progression; considering the popularities of both technologies. However, it imposes several challenges that need to be handled, such as the limited hardware capabilities of mobile phones and churn (i.e. the frequent join and leave of nodes within a network) intensive mobile networks offering limited yet expensive bandwidth availability. This thesis investigates the feasibility of extending P2P to mobile networks so that users can take advantage of both these technologies: P2P and mobile networks. This thesis utilises OverSim, a P2P simulator, to experiment with the performance of various P2P overlays, considering high churn and bandwidth consumption which are the two most crucial constraints of mobile networks. The experiment results show that Kademlia and EpiChord are the two most appropriate P2P overlays that could be implemented in mobile networks. Furthermore, Network Address Translation (NAT) is a major barrier to the adoption of P2P overlays in mobile networks. Integrating NAT traversal approaches with P2P overlays is a crucial step for P2P overlays to operate successfully on mobile networks. This thesis presents a general approach of NAT traversal for ring based overlays without the use of a single dedicated server which is then implemented in OverSim. Several experiments have been performed under NATs to determine the suitability of the chosen P2P overlays under NATed environments. The results show that the performance of these overlays is comparable in terms of successful lookups in both NATed and non-NATed environments; with Kademlia and EpiChord exhibiting the best performance. The presence of NATs and also the level of churn in a network influence the routing techniques used in P2P overlays. Recursive routing is more resilient to IP connectivity restrictions posed by NATs but not very robust in high churn environments, whereas iterative routing is more suitable to high churn networks, but difficult to use in NATed environments. Kademlia supports both these routing schemes whereas EpiChord only supports the iterating routing. This undermines the usefulness of EpiChord in NATed environments. In order to harness the advantages of both routing schemes, this thesis presents an adaptive routing scheme, called Churn Aware Routing Protocol (ChARP), combining recursive and iterative lookups where nodes can switch between recursive and iterative routing depending on their lifetimes. The proposed approach has been implemented in OverSim and several experiments have been carried out. The experiment results indicate an improved performance which in turn validates the applicability and suitability of ChARP in NATed environments.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Dražil, Jan. « Optimalizace síťových úloh ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255466.

Texte intégral
Résumé :
Nowdays, when we are running out of public IPv4 addresses, we rely on techniques that at least postpone their complete exhaustion. One of these techniques is a network address translation (NAT). Internet providers require the highest possible bandwidth from devices that perform this task. This thesis compares NAT DPDK, built on top of DPDK framework, with freely available alternatives. This work also extends NAT DPDK with Application-Level Gateway support.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Chugh, Sarabjeet Singh. « Impact of Network Address Translation on Router Performance ». Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/35307.

Texte intégral
Résumé :
Network Address Translation (NAT) is a method by which Internet Protocol (IP) addresses are ranslated from one group to another, in a manner transparent to the end users. It translates the source and destination addresses and ports in the Internet Protocol datagram. There are several benefits for using NAT. NAT can be installed without changes to hosts or routers, it allows reuse of globally routable addresses, it facilitates easy migration or addition of new networks and it provides a method to keep private network addresses hidden from the outside world.

NAT, however, is a processor- and memory-intensive activity for any device that implements it. This is because NAT involves reading from and writing to the header and payload information of every IP packet to do the address translation, a performance-intensive activity. It causes an increase in Central Processing Unit (CPU) and memory utilization and may impair throughput and increase the latency experienced by a packet. Thus, understanding the performance impact of NAT on a network device (in particular, a router) becomes an important factor when implementing NAT in any live network.

This thesis aims to understand and quantify the impact of Network Address Translation on a network router by doing a series of performance tests after specifying the performance parameters to measure and, then, clearly defining the performance testing methodology that is used to study each of the performance parameters. After a discussion of previous research, the measurement system and subsequent measurement results are described.
Master of Science

Styles APA, Harvard, Vancouver, ISO, etc.
5

Baumgartner, Trevor J. Phillips Matthew D. W. « Implementation of a Network Address Translation Mechanism Over IPv6 / ». Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004.
Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Phillips, Matthew D. W., et Trevor J. Baumgartner. « Implementation of a network address translation mechanism over IPv6 ». Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited
Network Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
Styles APA, Harvard, Vancouver, ISO, etc.
7

Nezirevic, Esmeralda. « Brandväggar för hemmakontor ». Thesis, Jönköping University, School of Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-617.

Texte intégral
Résumé :

Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable. It is important to understand how the firewall protects the network and how to configure it. This paper gives the reader a clear idea how firewalls can protect against different attacks and improve the security.

Computers are not safe when connected to Internet. This paper is about how to use a personal firewall to protect a computer when connected to Internet. One of the firewalls in this examination is Norton Personal Firewall 2005.

Perkins, “Firewalls 24seven, 2nd Edition” and Brian Komar, Ronald Beekelaar and Joern Wettern “Firewalls for Dummies”. Information has also been collected from Apples home page.

It is important to have knowledge about different attacks against network traffic and also about how to protect against them. To know the risks is the first step to be able to evolve an own strategy; too defend network attack.

Styles APA, Harvard, Vancouver, ISO, etc.
8

Vrána, Roman. « Testování vysokorychlostního nástroje pro překlad IP adres ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255338.

Texte intégral
Résumé :
This master thesis presents a topic of testing network address translation. It describes basic principles of network address translation and general methods for testing network devices. These methods are then applied on NAT devices. Thesis then introduces a design of a  framework for performing functional tests. The designed framework is then implemented as a part of the thesis and used to test a newly developed high-speed NAT application.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Pecel, Deniz. « Enhanced Hole Punching For Rssi Location Tracking In Hospitals ». Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609406/index.pdf.

Texte intégral
Résumé :
With the enhancement of the Radio signal communication systems, Wi-Fi technology become a &ldquo
de facto&rdquo
standard used in Campus areas such as hospitals and universities. Besides being used as a data communication method, Received Signal Strength Indicator (RSSI) is also used as a location tracking method. There are lots of studies enhancing the RSSI based location tracking. In this thesis we tried to generate a test environment as close to a real Wi-Fi network scenario as possible. Our aim is to implement a simple moving client among different wireless local area networks, which is tracked across the internet by a stationary client. We also assumed that there is a Network Address Translation (NAT) at both LAN internet edges.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Scarlato, Michele. « Sicurezza di rete, analisi del traffico e monitoraggio ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Texte intégral
Résumé :
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Pace, Alessio. « Quelques défis posés par l'utilisation de protocoles de Gossip dans l'Internet ». Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00636386.

Texte intégral
Résumé :
Les systèmes pair-à-pair (P2P) sont aujourd'hui très populaires. Leur utilisation va de la messagerie instantanée au partage de fichiers, en passant par la sauvegarde et le stockage distribué ou encore le streaming video. Parmi les protocoles P2P, les protocoles basés sur le "gossip" sont une famille de protocoles qui a fait l'objet de nombreux travaux de recherche durant la dernière décennie. Les raisons de l'engouement pour les protocoles basés sur le "gossip" sont qu'ils sont considérés robustes, faciles à mettre en oeuvre et qu'ils ont des propriétés de passage à l'échelle intéressantes. Ce sont donc des candidats intéressants dès lors qu'il s'agit de réaliser des systèmes distribués dynamiques à large échelle. Cette thèse considère deux problématiques rencontrées lorsque l'on déploie des protocoles basé sur le "gossip" dans un environnement réel comme l'Internet. La première problématique est la prise en compte des pare-feux (NAT) dans le cadre des protocoles d'échantillonnage basés sur le "gossip". Ces protocoles font l'hypothèse que, a tout moment, chaque noeud est capable de communiquer avec n'importe quel noeud du réseau. Cette hypothèse est fausse dès lors que certains noeuds utilisent des NAT. Nous présentons Nylon, un protocole d'échantillonnage qui fonctionne malgré la présence de NAT. Nylon introduit un faible surcoût pour gérer les NAT et partage équitablement ce surcoût entre les noeuds possédant un NAT et les autres noeuds. La deuxième problématique que nous étudions est la possibilité de limiter la dissémination de messages de type "spam" dans les protocoles de dissémination basés sur le "gossip". Ces protocoles sont en effet des vecteurs idéaux pour diffuser les messages de type "spam" du fait qu'il n'y a pas d'autorité de contrôle permettant de filtrer les messages basés sur leur contenu. Nous proposons FireSpam, un protocole de dissémination basé sur le "gossip" qui permet de limiter la diffusion des messages de type "spam". FireSpam fonctionne par filtrage décentralisé (chaque noeud participe au filtrage). Par ailleurs, il fonctionne malgré la présence d'une fraction de noeuds malicieux (aussi appelés "Byzantins") et malgré la présence de noeuds dits "rationnels" (aussi appelés "égoïstes"). Ces derniers sont prêts à dévier du protocole s'ils ont un intérêt à le faire.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Wei, Zhonghua. « The impact of network address translation on peer-to-peer live video streaming systems ». Thesis, 2011. http://hdl.handle.net/1828/3728.

Texte intégral
Résumé :
Video streaming over the Internet can be very difficult under the traditional client-server model. Peer-to-peer (P2P) systems, in which each participating peer contributes its upload bandwidth to other peers while it downloads data, have been successful in file-sharing applications, and they appear to be promising in delivering video contents, too. However, the existence of network address translation (NAT) is always considered as a challenge to peer-to-peer systems. NAT has been a practical solution to the Internet Protocol version 4 (IPv4) address exhaustion problem, as it reduces the usage of IP addresses by allowing multiple private hosts to share a single public IP address, but NAT can degrade the performance of a peer-to-peer system as it limits the direction of connectivity. Measurement studies show that a considerable fraction of peer-to-peer video streaming system users are behind NAT devices, and that their uplink bandwidth is not well utilized, but the literature lacks a quantitative analysis of the impact of NAT on the performance of P2P video streaming systems. In this thesis, an extensible analytical model is built to capture the performance for P2P live streaming systems with a certain percentage of users behind NAT and cannot be reached by NAT traversal techniques, the correctness of which is verified by software simulation. A simple mechanism is proposed in this thesis, which is able to effectively improve the system performance and fairness by counteracting the negative impact of NAT, and it can also be used to reduce the usage of server bandwidth.
Graduate
Styles APA, Harvard, Vancouver, ISO, etc.
13

Gokcen, Yasemin. « A PRELIMINARY STUDY FOR IDENTIFYING NAT TRAFFIC USING MACHINE LEARNING ». 2014. http://hdl.handle.net/10222/49104.

Texte intégral
Résumé :
It is shown in the literature that the NAT devices have become a convenient way to hide the identity of malicious behaviors. In this thesis, the aim is to identify the presence of the NAT devices in the network traffic and (if possible) to predict the number of users behind those NAT devices. To this end, I utilize different approaches and evaluate the performance of these approaches under different network environments represented by the availability of different data fields. To achieve this, I propose a machine learning (ML) based approach to detect NAT devices. I evaluate my approach against different passive fingerprinting techniques representing the state-of-the-art in the literature and show that the performance of the proposed ML based approach is very promising even without using any payload (application layer) information.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Liu, Yangyang. « Performance evaluation of BitTorrent-like peer-to-peer systems in the presence of network address translation devices ». Thesis, 2010. http://hdl.handle.net/1828/2193.

Texte intégral
Résumé :
There is no doubt that BitTorrent nowadays is one of the most popular peer-to-peer (P2P) applications on the Internet, contributing to a significant portion of the total Internet traffic and being a basis for many other emerging services such as P2P Internet Protocol Television and Video on Demand. On the other hand, Network Address Translation (NAT) devices have become pervasive in almost all networking scenarios. Despite of the effort of NAT traversal, it is still very likely that applications, especially P2P ones, cannot receive incoming connection requests properly if they are behind NAT. Although this phenomenon has been widely observed in measurement work, so far there is no quantitative study in the literature examining the impact of NAT on P2P applications. In this work, we build analytical models to capture the performance of BitTorrent-like P2P systems in a steady state, in the presence of homogeneous and heterogeneous NAT peers. We also propose biased optimistic unchoke strategies, in order to improve the overall system performance and fairness metrics considerably. The analytical models have been validated by simulation results, which also reveal some interesting facts about the coexistence of NAT and public peers in P2P systems.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Chun-Hung, Chen, et 陳俊宏. « A Study of Network Address Translation Devices Detection ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/87803476600436360137.

Texte intégral
Résumé :
碩士
玄奘大學
資訊科學學系碩士班
95
Monitoring the user's behavior in network environment, the rule of IP address allocation is that the user assigned to a single public IP address. The network address translation technology enables multiple users to access concurrently the internet on a private network that using a single public IP address in order to reduce the consumption of public IP address. However, users may use a device with network address translation function at their convenience, but do not have a good control of identity authentication which may enable others can access the internet by the same IP address. These behaviors not only discomfit the rules of network management, but also open a hiding loophole for the malicious user that may increase the complexity and the security crisis of network management. Currently, the method for detecting the device with network address translation function is to search and analysis arduously the available information in the network packet data, then determine the device existence or not. In the past, analyzing the identification number in the IP packet for inferring the amount of user under the same public IP address had been proposed. However, due to the network delay, or lose the packet accounted for packet retransmission, this kind of method was often unable to classify the packet effectively, and might cause the mistake of detecting. Therefore, we will provide a method to advance the timestamps factor of the network TCP layer. It will support the network administrator to observe the unusual using behavior in the single public IP address at the same time, and detect the network address translation device hided in the network.
Styles APA, Harvard, Vancouver, ISO, etc.
16

廖永申. « The Development of Network Address Translation and Protocol Translation on Embedded Linux ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/50114561925178379709.

Texte intégral
Résumé :
碩士
大葉大學
資訊工程學系碩士班
92
Rapid growth of Internet participants and development of mobile computing have escalated the depletion of limited 32bits IPv4 addresses. In responding, newer IPv6 that equipped with 128 bits addresses is developed. The transition of IPv4 to IPv6 takes time, hence IETF develops a series of schemes for the Internet to sustain both IPv4 and IPv6 during the transition. Among these schemes, NAT-PT is well adapted for its simplicity. This paper concerns implementation of NAT-PT on an embedded based Residential Gateway and assesses the power dissipation of the implementation using dynamic profiling and cross-compiling techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
17

林欽漢. « Studying on IP Mobility under Network Address Translation Environment ». Thesis, 2003. http://ndltd.ncl.edu.tw/handle/54949483376852572610.

Texte intégral
Résumé :
碩士
中華大學
資訊工程學系碩士班
91
The trend of using Internet is growing rapidly. To cope with the IP depletion, NAT is proposed to solve this problem. In the other hand, there are more devices with mobility capability in the world. It seems IP mobility will be an important issue in the future. Mobile IP is one possible solution which recognized by most people for the IP mobility. But when we try to integrate Mobile IP technique with NAT technique, we encounter some problems. It is inconvenient using Mobile IP under NAT environment. Because mobile node must specify the public address of home network manually when it moves to the foreign network. And there are still some other problems. In this thesis, we try to propose a new framework which can provide IP mobility in NAT environment. We design a system framework referred to Mobile IP and NAT techniques. And adjust some parts of the framework. As the result, mobile node can roam under NAT environment and keep on the data communication in the processing. Data will be not loss without adjustment manually. So the whole system will be more feasible in this manner.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Lin, Chen-Chuan, et 林振全. « A Proxy Mobile IP Architecture with Fast Network Address Translation ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/03955733093837903060.

Texte intégral
Résumé :
碩士
國立交通大學
網路工程研究所
98
A variety of wireless technologies have been popularized in recent years and enable users to connect to the Internet from almost everywhere. This brings the demand on the user mobility that allows a mobile device roams from one place to another without any application disruption. Proxy mobile IP (PMIP) provides network based mobility management to support unmodified mobile device but it cannot apply on non point-to-point networks suck as IEEE 802.11. On the other hand, the demand for IP addresses by mobile terminals can be solved by NAT which is unfortunately not compatible with MIP/PMIP. In this thesis, we propose a novel cross-layer network address translation scheme called Network Address Translation on Demand (NAToD) and integrate it with proxy mobile IPv4. The scheme allows PMIP running on the most popular IEEE 802.11 networks, and it only requires software upgrading on the AP itself. Doing this way, we can reduce the deployment cost as well as shorten the system deployment time. The experiment result shows that NAToD achieve better performance in most cases.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Yu-Wei, Chuang, et 莊育維. « The Network Address Translation Problem of the Home Automation Network:Issues and Solutions ». Thesis, 2002. http://ndltd.ncl.edu.tw/handle/50820409287497720399.

Texte intégral
Résumé :
碩士
國立交通大學
資訊管理所
90
The home automation network (HAN) has become an important research topic for the past few years. Standards and technologies for HAN have been proposed and are frequently discussed in both academic and industry circles. The HAN has to provide the network address translation (NAT) mechanism for solving the addressing problem, since the IPv4 addressing scheme is inadequate for today’s Internet; i.e., it is impossible to assign a unique IP address to every in-home devices. All IP-sensitive applications can cause executive problems while using the NAT router. The Realm Specific IP (RSIP) provides an alternative to remedy this limitation, but complications still exist. In this paper, we propose solutions to these complications by using the lightweight directory access protocol (LDAP). We define a LDAP schema that can be used to store all necessary information generated by RSIP, and build a web-based network address translation system. The RSIP in conjunction with the LDAP schema provides a robust mechanism for dealing with the network address translation problem of HAN.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Hsieh, Frank, et 謝源博. « The Design and Implementation of Integration system of Network Address Translation and Load Balancing ». Thesis, 2000. http://ndltd.ncl.edu.tw/handle/96035361699923236924.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie