Gotowa bibliografia na temat „Dynamic Searchable Symmetric Encryption”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Dynamic Searchable Symmetric Encryption”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Dynamic Searchable Symmetric Encryption"

1

Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.

Pełny tekst źródła
Streszczenie:
Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks against DSSE. In this paper, we propose a dynamic database padding method to mitigate the threat of data leakage during the update operation of outsourcing data. First, we introduce an outlier detection technology where bogus files are generated for padding according to the outlier factors, hiding the document information currently matching search keywords. Furthermore, we design a new index str
Style APA, Harvard, Vancouver, ISO itp.
2

Guo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.

Pełny tekst źródła
Streszczenie:
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leaking information related to the contents of the files. Searchable symmetric encryption (SSE) is an important branch of SE. Most of the existing SSE schemes considered single-user settings, which cannot meet the requirements for data sharing. In this work, we propose a multi-user searchable symmetric encryption scheme with dynamic updates. This sch
Style APA, Harvard, Vancouver, ISO itp.
3

Kissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.

Pełny tekst źródła
Streszczenie:
Abstract In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement, and is proven secure under adaptively chosen query attacks (CQA2) in the random oracle model with an honest-but-curious adversary. To our knowledge, this is the first encrypted phrase search sy
Style APA, Harvard, Vancouver, ISO itp.
4

Etemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.

Pełny tekst źródła
Streszczenie:
Abstract Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing f
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.

Pełny tekst źródła
Streszczenie:
Dynamic Searchable Symmetric Encryption for Multiuser (M-DSSE) is an advanced form of symmetric encryption. It extends the traditional symmetric encryption to support the operations of adding and deleting the encrypted data and allow an authenticated group of data users to retrieve their respective desired encrypted data in the dynamic database. However, M-DSSE would suffer from the privacy concerns regarding forward and backward security. The former allows an attacker to identify the keywords contained in the added data by lunching file-injection attacks, while the latter allows to utilize th
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.

Pełny tekst źródła
Streszczenie:
Abstract Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted database. Range queries are commonly needed. Previous range-searchable schemes either do not support updates natively (SIGMOD’16) or use file indexes of many long bit-vectors for distinct keywords, which only support toggling updates via homomorphically flipping the presence bit. (ESORICS’18). We propose a generic upgrade of any (inverted-index) DSSE to support range queries (a.k.a. range DSSE), without homomorphic encryption, and a specific instantiation with a new trade-off redu
Style APA, Harvard, Vancouver, ISO itp.
7

Cui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.

Pełny tekst źródła
Streszczenie:
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack . In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leak
Style APA, Harvard, Vancouver, ISO itp.
8

Zhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.

Pełny tekst źródła
Streszczenie:
Searchable symmetric encryption that supports dynamic multikeyword ranked search (SSE-DMKRS) has been intensively studied during recent years. Such a scheme allows data users to dynamically update documents and retrieve the most wanted documents efficiently. Previous schemes suffer from high computational costs since the time and space complexities of these schemes are linear with the size of the dictionary generated from the dataset. In this paper, by utilizing a shallow neural network model called “Word2vec” together with a balanced binary tree structure, we propose a highly efficient SSE-DM
Style APA, Harvard, Vancouver, ISO itp.
9

Bilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.

Pełny tekst źródła
Streszczenie:
Searchable symmetric encryption (SSE) enables clients to outsource their encrypted documents into a remote server and allows them to search the outsourced data efficiently without violating the privacy of the documents and search queries. Dynamic SSE schemes (DSSE) include performing update queries, where documents can be added or removed at the expense of leaking more information to the server. Two important privacy notions are addressed in DSSE schemes: forward and backward privacy. The first one prevents associating the newly added documents with previously issued search queries. While the
Style APA, Harvard, Vancouver, ISO itp.
10

Huang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Dynamic Searchable Symmetric Encryption"

1

Nordahl, Christian, and Malin Lindström. "The BXT-Bitmap : An Efficient Searchable Symmetric Encryption Scheme." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12062.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.

Pełny tekst źródła
Streszczenie:
Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data confidentiality. Encryption and efficient accessibility are naturally at odds, as for instance strong encryption necessitates that ciphertexts reveal nothing about underlying data. Searchable encryption is an active field in cryptography studying encryption schemes that provide varying levels of efficiency, functionality, and security, and efficient searchable encryption focuses on schemes enabling sub-linear (in the size of the database) sear
Style APA, Harvard, Vancouver, ISO itp.
3

Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.

Pełny tekst źródła
Streszczenie:
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their u
Style APA, Harvard, Vancouver, ISO itp.
4

Wu, Chia-Feng, and 吳嘉峰. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69702371852681789221.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>103<br>Searchable symmetric encryption (SSE) is a more and more important technique for cloud computing. It lets us can store critical data by encryption in the untrusted cloud server but allows us search the encrypted data with the keyword. The server will not know the keyword and the data content but it can retrieval the correct data to us. However, a database with SSE is not enough practical because the data is not invariable. In general, we modify the data frequently even if it stores in the remote server. The server must can update the encrypted data without de
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Cheng-Wei, and 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.

Pełny tekst źródła
Streszczenie:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>101<br>We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his fi
Style APA, Harvard, Vancouver, ISO itp.
6

Shah, Akash. "Efficient and Secure Search over Encrypted Data." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.

Pełny tekst źródła
Streszczenie:
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the client has to retrieve the entire data and decrypt it in order to get results for a search query then that will defeat the purpose of outsourcing. A solution to this problem is Searchable Encryption that provides a reasonable trade-off between security and effciency. Our first contribution is in the context of Dynamic Searchable Symmetric Encryption (DSSE). DSSE schemes
Style APA, Harvard, Vancouver, ISO itp.
7

Chang, Li-Tzu, and 張儷子. "Efficient Conjunctive Keyword-Based Symmetric Searchable Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/rp5p8u.

Pełny tekst źródła
Streszczenie:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>99<br>In the era of cloud computing, private information in the open network server can be accessed anywhere and anytime. As a result, the protection of personal private informa-tion becomes very important. Keyword-searchable encryption has been proposed to protect private information stored in servers while allowing clients to retrieve needed information based on keyword searching. In this thesis, we propose an efficient key-word-searchable encryption scheme. The proposed scheme with conjunctive keyword search is secure against adaptive chosen keyword attacks. Mo
Style APA, Harvard, Vancouver, ISO itp.
8

Oliveira, Filipe Miguel Santos de. "A Systems Approach to Searchable Encryption." Master's thesis, 2020. http://hdl.handle.net/10362/116774.

Pełny tekst źródła
Streszczenie:
The expansion of cloud services facilitates access to hardware and software resources. The number of clients has been raising and so, the amount of data in the cloud provider’s servers. Lots of this data have personal pieces of information that must be protected to guarantee privacy for data owners. Searchable encryption (SE) and symmetric searchable encryption (SSE) provide an effi cient way to protect data and enable searching operations when stored in cloud provider’s servers. Although all the work in this area some details are left outside the scope or for future consideration. Is ne
Style APA, Harvard, Vancouver, ISO itp.
9

Jheng, Ren-Jen, and 鄭仁傑. "Research and Implementation of Unlinkable Searchable Symmetric Encryption Schemes for Cloud Storage." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/41868079914619377925.

Pełny tekst źródła
Streszczenie:
碩士<br>樹德科技大學<br>資訊工程系碩士班<br>101<br>The cloud storage service provides users a very convenient and omnipresent way to store and access data. Behind the convenient service, however, there exist many security issues. Services hardware equipment is not a user can control or during the transfer of files may be intercepted. In order to protect data, many users will encrypt their files in advance before uploading them to the cloud storage. But the original search method has been unable to effectively search the cipher text. Therefore, how to achieve an efficient and secure search on cipher text becom
Style APA, Harvard, Vancouver, ISO itp.
10

Borges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment." Master's thesis, 2018. http://hdl.handle.net/10362/59506.

Pełny tekst źródła
Streszczenie:
Cloud computing has become a standard computational paradigm due its numerous advantages, including high availability, elasticity, and ubiquity. Both individual users and companies are adopting more of its services, but not without loss of privacy and control. Outsourcing data and computations to a remote server implies trusting its owners, a problem many end-users are aware. Recent news have proven data stored on Cloud servers is susceptible to leaks from the provider, third-party attackers, or even from government surveillance programs, exposing users’ private data. Different approach
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Dynamic Searchable Symmetric Encryption"

1

Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.

Pełny tekst źródła
Streszczenie:
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage. New schemes with more efficient search operations and reduced access and search pattern leakage that support novel settings, such as dynamic data sets and multiple users, have been proposed in the last few years. Especially with the emergence of cloud storage, encryptin
Style APA, Harvard, Vancouver, ISO itp.
2

Minaud, Brice, and Michael Reichle. "Dynamic Local Searchable Symmetric Encryption." In Advances in Cryptology – CRYPTO 2022. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15985-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kamara, Seny, and Charalampos Papamanthou. "Parallel and Dynamic Searchable Symmetric Encryption." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Gajek, Sebastian. "Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption." In Topics in Cryptology - CT-RSA 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29485-8_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kurosawa, Kaoru, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama. "UC-Secure Dynamic Searchable Symmetric Encryption Scheme." In Advances in Information and Computer Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44524-3_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang, and Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption." In Future Data and Security Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Qiao, Yu Guo, Hejiao Huang, and Xiaohua Jia. "Multi-user Forward Secure Dynamic Searchable Symmetric Encryption." In Network and System Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Li, Jinyang, Zhenfu Cao, Jiachen Shen, and Xiaolei Dong. "MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Weener, Jeroen, Florian Hahn, and Andreas Peter. "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10684-2_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zuo, Cong, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. "Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29962-0_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Dynamic Searchable Symmetric Encryption"

1

Son, Masaharu, Takeshi Nakai, and Koutarou Suzuki. "Search Result Verifiability in Multi-User Dynamic Searchable Symmetric Encryption." In 2024 11th International Conference on Advanced Informatics: Concept, Theory and Application (ICAICTA). IEEE, 2024. http://dx.doi.org/10.1109/icaicta63815.2024.10763128.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Deng, Qinghua, Lanxiang Chen, Yizhao Zhu, and Yi Mu. "Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud." In 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2024. https://doi.org/10.1109/cyberc62439.2024.00040.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chen, Zhiqiang, Yue Zhao, Fei Teng, Jie Hu, Bo Tian, and Hao Zhang. "Dynamic Searchable Symmetric Encrypted Knowledge Graph." In 2024 16th International Conference on Communication Software and Networks (ICCSN). IEEE, 2024. https://doi.org/10.1109/iccsn63464.2024.10793303.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mieno, Takehiko, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa, and Hiroaki Yamamoto. "Formal Security Verification for Searchable Symmetric Encryption Using ProVerif." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858210.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Watanabe, Dai, and Masayuki Yoshino. "Practical Key Management for Searchable Symmetric Encryption Using Fuzzy Extractor." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858229.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhang, Yijing, Dejiang Su, Yun Zhao, Haolin Wang, Ziwen Cai, and Yuxin Lu. "Conjunctive Dynamic Searchable Encryption Scheme for Smart Grid Data in the Cloud." In 2024 8th International Conference on Communication and Information Systems (ICCIS). IEEE, 2024. https://doi.org/10.1109/iccis63642.2024.10779412.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kamara, Seny, Charalampos Papamanthou, and Tom Roeder. "Dynamic searchable symmetric encryption." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382298.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Shibata, Toshiya, and Kazuki Yoneyama. "Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption." In ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3457338.3458290.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Salmani, Khosro, and Ken Barker. "Dynamic Searchable Symmetric Encryption with Full Forward Privacy." In 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP). IEEE, 2020. http://dx.doi.org/10.1109/icsip49896.2020.9339338.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Wu, Chia-Feng, Yen-Wu Ti, Sy-Yen Kuo, and Chia-Mu Yu. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." In 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019. http://dx.doi.org/10.1109/icea.2019.8858302.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!