Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iet-ifs/iet-ifs4.bht:"
@article{DBLP:journals/iet-ifs/AminiJ10, author = {Morteza Amini and Rasool Jalili}, title = {Multi-level authorisation model and framework for distributed semantic-aware environments}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {301--321}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0198}, doi = {10.1049/IET-IFS.2009.0198}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AminiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BaigS10, author = {Zubair A. Baig and Khaled Salah}, title = {Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {333--343}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0255}, doi = {10.1049/IET-IFS.2009.0255}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BaigS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BeraGD10, author = {Padmalochan Bera and Santosh K. Ghosh and Pallab Dasgupta}, title = {Integrated security analysis framework for an enterprise network - a formal approach}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {283--300}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0174}, doi = {10.1049/IET-IFS.2009.0174}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BeraGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BishopORL10, author = {Stephen Bishop and Hamed Okhravi and Shahram Rahimi and Yung{-}Chuan Lee}, title = {Covert channel resistant information leakage protection using a multi-agent architecture}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {233--247}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0202}, doi = {10.1049/IET-IFS.2009.0202}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/BishopORL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Bravo-SolorioGNA10, author = {Sergio Bravo{-}Solorio and Lu Gan and Asoke K. Nandi and Maurice F. Aburdene}, title = {Secure private fragile watermarking scheme with improved tampering localisation accuracy}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {137--148}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0141}, doi = {10.1049/IET-IFS.2009.0141}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Bravo-SolorioGNA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BulensSQ10, author = {Philippe Bulens and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {How to strongly link data and its medium: the paper case}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {125--136}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0032}, doi = {10.1049/IET-IFS.2009.0032}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/CaleroPG10, author = {Jose M. Alcaraz Calero and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {Towards an authorisation model for distributed systems based on the Semantic Web}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {411--421}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0260}, doi = {10.1049/IET-IFS.2009.0260}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/CaleroPG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Chandrasekhar0SC10, author = {Santosh Chandrasekhar and Saikat Chakrabarti and Mukesh Singhal and Kenneth L. Calvert}, title = {Efficient proxy signatures based on trapdoor hash functions}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {322--332}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0204}, doi = {10.1049/IET-IFS.2009.0204}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Chandrasekhar0SC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DaemenR10, author = {Joan Daemen and Vincent Rijmen}, title = {Refinements of the {ALRED} construction and {MAC} security claims}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {149--157}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2010.0015}, doi = {10.1049/IET-IFS.2010.0015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FanSGL10, author = {Haining Fan and Jia{-}Guang Sun and Ming Gu and Kwok{-}Yan Lam}, title = {Overlap-free Karatsuba-Ofman polynomial multiplication algorithms}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {1}, pages = {8--14}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0039}, doi = {10.1049/IET-IFS.2009.0039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FanSGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FatemiSS10, author = {Mitra Fatemi and Somayeh Salimi and Ahmad Salahi}, title = {Anonymous roaming in universal mobile telecommunication system mobile networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {93--103}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0154}, doi = {10.1049/IET-IFS.2009.0154}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FatemiSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GuoLDC10, author = {Ming{-}Huang Guo and Horng{-}Twu Liaw and Der{-}Jiunn Deng and Han{-}Chieh Chao}, title = {Cluster-based secure communication mechanism in wireless ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {352--360}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0120}, doi = {10.1049/IET-IFS.2009.0120}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GuoLDC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HaoRZ10, author = {Feng Hao and Peter Y. A. Ryan and Piotr Zielinski}, title = {Anonymous voting by two-round public discussion}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {62--67}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2008.0127}, doi = {10.1049/IET-IFS.2008.0127}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HaoRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuangCCC10, author = {Wen{-}Tzeng Huang and Chih{-}Hsiang Chang and Che Wun Chiou and Fu{-}Hua Chou}, title = {Concurrent error detection and correction in a polynomial basis multiplier over GF(2\({}^{\mbox{m}}\))}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {111--124}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0160}, doi = {10.1049/IET-IFS.2009.0160}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuangCCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Jensen10, author = {Christian Damsgaard Jensen}, title = {Supporting multi-agent reputation calculation in the Wikipedia Recommender System}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {273--282}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2010.0001}, doi = {10.1049/IET-IFS.2010.0001}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Jensen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KarakoyunluGSL10, author = {Deniz Karakoyunlu and Frank Kagan G{\"{u}}rkaynak and Berk Sunar and Yusuf Leblebici}, title = {Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {1}, pages = {30--43}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0038}, doi = {10.1049/IET-IFS.2009.0038}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KarakoyunluGSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiJZZW10, author = {Xin Li and Zhiping Jia and Peng Zhang and Ruihua Zhang and Haiyang Wang}, title = {Trust-based on-demand multipath routing in mobile ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {212--232}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0140}, doi = {10.1049/IET-IFS.2009.0140}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiJZZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiuV10, author = {Jing Liu and Laurent Vigneron}, title = {Design and verification of a non-repudiation protocol based on receiver-side smart card}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {1}, pages = {15--29}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0086}, doi = {10.1049/IET-IFS.2009.0086}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiuV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MisraKA10, author = {Sudip Misra and P. Venkata Krishna and Kiran Isaac Abraham}, title = {Adaptive link-state routing and intrusion detection in wireless mesh networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {374--389}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0196}, doi = {10.1049/IET-IFS.2009.0196}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MisraKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/NojoumianSG10, author = {Mehrdad Nojoumian and Douglas R. Stinson and Morgan Grainger}, title = {Unconditionally secure social secret sharing scheme}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {202--211}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0098}, doi = {10.1049/IET-IFS.2009.0098}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/NojoumianSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/RajiL10, author = {Fatemeh Raji and Behrouz Tork Ladani}, title = {Anonymity and security for autonomous mobile agents}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {397--410}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0217}, doi = {10.1049/IET-IFS.2009.0217}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/RajiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/RashvandSCH10, author = {Habib F. Rashvand and Khaled Salah and Jose M. Alcaraz Calero and Lein Harn}, title = {Distributed security for multi-agent systems - review and applications}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {188--201}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2010.0041}, doi = {10.1049/IET-IFS.2010.0041}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/RashvandSCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SakarindrA10, author = {Pitipatana Sakarindr and Nirwan Ansari}, title = {Survey of security services on group communications}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {258--272}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0261}, doi = {10.1049/IET-IFS.2009.0261}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SakarindrA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SekhavatF10, author = {Yoones Asgharzadeh Sekhavat and Mohammad Fathian}, title = {Mining frequent itemsets in the presence of malicious participants}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {80--92}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0128}, doi = {10.1049/IET-IFS.2009.0128}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SekhavatF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Shirali-ShahrezaS10, author = {Mohammad Hassan Shirali{-}Shahreza and Sajad Shirali{-}Shahreza}, title = {Real-time and {MPEG-1} layer {III} compression resistant steganography in speech}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {1}, pages = {1--7}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2008.0129}, doi = {10.1049/IET-IFS.2008.0129}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Shirali-ShahrezaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VelichkovRP10, author = {Vesselin Velichkov and Vincent Rijmen and Bart Preneel}, title = {Algebraic cryptanalysis of a small-scale version of stream cipher Lex}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {49--61}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0118}, doi = {10.1049/IET-IFS.2009.0118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Wang10, author = {Bin Wang}, title = {On the security of an identity-based proxy multi-signature scheme}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {45--48}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0033}, doi = {10.1049/IET-IFS.2009.0033}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangC10, author = {Wenqiang Wang and Shaozhen Chen}, title = {Attribute-based ring signature scheme with constant-size signature}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {104--110}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0189}, doi = {10.1049/IET-IFS.2009.0189}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangW10, author = {Kun Wang and Meng Wu}, title = {Cooperative communications based on trust model for mobile ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {68--79}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0056}, doi = {10.1049/IET-IFS.2009.0056}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WenHCG10, author = {Hong Wen and Pin{-}Han Ho and Qi Chai and Guang Gong}, title = {Physical layer assisted authentication for distributed ad hoc wireless sensor networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {390--396}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0197}, doi = {10.1049/IET-IFS.2009.0197}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WenHCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YargicogluI10, author = {A. Utku Yargi{\c{c}}oglu and Hakki G{\"{o}}khan Ilk}, title = {Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {158--166}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0092}, doi = {10.1049/IET-IFS.2009.0092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YargicogluI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YenWGYC10, author = {Chih{-}Ta Yen and Tzong{-}Chen Wu and Ming{-}Huang Guo and Chuan{-}Kai Yang and Han{-}Chieh Chao}, title = {Digital product transaction mechanism for electronic auction environment}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {248--257}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0250}, doi = {10.1049/IET-IFS.2009.0250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YenWGYC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YuZL10, author = {Meng Yu and Wanyu Zang and Peng Liu}, title = {Recovery of data integrity under multi-tier architectures}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {344--351}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0264}, doi = {10.1049/IET-IFS.2009.0264}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YuZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangCCSPP10, author = {Yi{-}Ying Zhang and Han{-}Chieh Chao and Min Chen and Lei Shu and Chulhyun Park and Myong{-}Soon Park}, title = {Outlier detection and countermeasure for hierarchical wireless sensor networks}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {4}, pages = {361--373}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0192}, doi = {10.1049/IET-IFS.2009.0192}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangCCSPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhaoF10, author = {Xianfeng Zhao and Dengguo Feng}, title = {Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {167--184}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2007.0110}, doi = {10.1049/IET-IFS.2007.0110}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhaoF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.