MoneroResearch.info

List Resources

Displaying 1 - 100 of 210 (Bibliography: WIKINDX Master Bibliography)
Parameters
List all
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol.  
Last edited by: Jack 7/29/23, 3:03 AM
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.  
Added by: endor 4/17/22, 9:05 PM
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of bitcoin, monero, zcash, ethereum, ripple, and iota. WIREs Data Mining and Knowledge Discovery, 12(1), e1436.  
Added by: Rucknium 2/23/22, 10:27 PM
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670].  
Last edited by: Rucknium 7/1/22, 4:11 PM
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in information systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.  
Added by: Rucknium 4/5/24, 9:26 PM
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! : Extendability for threshold ring signatures. [Cryptology ePrint Archive, Report 2021/1240]  
Last edited by: Plowsof 3/9/22, 5:28 PM
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).  
Last edited by: endor 4/19/22, 11:11 PM
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and privacy-aware blockchain design: Requirements, challenges and solutions. Journal of Cybersecurity and Privacy, 1(1), 164–194.  
Added by: Rucknium 2/23/22, 3:58 PM
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy channels: Bitcoin-compatible bi-directional payment channels without watchtowers. [Cryptology ePrint Archive, Report 2021/1445].  
Last edited by: Rucknium 4/20/22, 3:56 PM
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 8:31 PM
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s monero drive-by crypto-jacking. IOP Conference Series: Materials Science and Engineering, 769(1), 12065.  
Last edited by: Jack 1/18/23, 12:05 AM
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070].  
Last edited by: Rucknium 1/5/24, 10:08 PM
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A review of privacy-preserving cryptographic techniques used in blockchain platforms. Paper presented at Digital Technologies and Applications.  
Added by: Rucknium 1/6/24, 5:36 PM
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. Do fundamentals drive cryptocurrency prices?.  
Last edited by: Jack 1/20/23, 6:00 PM
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Last edited by: Rucknium 5/5/22, 8:31 PM
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in bitcoin, dash, monero, and zcash. Pervasive and Mobile Computing, 59, 101030.  
Last edited by: Jack 1/8/23, 3:27 AM
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive,  
Last edited by: Jack 7/29/23, 3:05 AM
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of anonymous signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. [Cryptology ePrint Archive, Paper 2024/042].  
Last edited by: Rucknium 4/5/24, 9:33 PM
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security.  
Last edited by: endor 4/17/22, 10:47 PM
Borggren, N., & Yao, L. (2020). Correlations of multi-input monero transactions. arXiv preprint arXiv:2001.04827,  
Last edited by: Rucknium 4/20/22, 3:36 PM
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated blockchains for machine learning traceability and transaction values in the monero network. arXiv preprint arXiv:2001.03937,  
Last edited by: Jack 4/1/22, 6:46 PM
Broniatowski, M. (2021). Minimum divergence estimators, maximum likelihood and the generalized bootstrap. Entropy, 23(2), 185.  
Last edited by: Rucknium 3/12/22, 4:40 AM
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26 A traffic-analysis proof solution to allow k-anonymous payments in pseudonymous blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop.  
Added by: Rucknium 1/5/24, 8:51 PM
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.  
Added by: Rucknium 7/1/22, 4:19 PM
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust.  
Added by: Rucknium 10/12/22, 4:26 PM
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756].  
Last edited by: Rucknium 12/29/22, 4:41 PM
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 12/13/22, 6:56 PM
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the instability of bitcoin without the block reward.  
Added by: endor 4/17/22, 11:28 PM
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.  
Last edited by: Jack 1/20/23, 6:05 PM
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications.  
Added by: endor 4/17/22, 10:41 PM
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A systematic approach to cryptocurrency fees. Paper presented at Financial Cryptography and Data Security.  
Added by: endor 4/17/22, 10:41 PM
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems. Cryptology ePrint Archive,  
Last edited by: Jack 6/6/23, 9:13 PM
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082.  
Last edited by: Jack 3/29/23, 6:12 PM
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications.  
Added by: Rucknium 5/5/22, 9:43 PM
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321].  
Last edited by: Jack 3/8/23, 6:11 PM
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334.  
Last edited by: Jack 3/28/23, 9:58 PM
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 7/5/22, 5:01 PM
Dijk, A., & Schröder, D. (2023). Proof of concept for a ethereum virtual machine on cryptonote. Unpublished manuscript.  
Added by: Rucknium 1/5/24, 8:32 PM
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise ringct protocol based on linkable threshold ring signature. IEEE Transactions on Dependable and Secure Computing, (1), 1–15.  
Last edited by: Jack 2/27/24, 1:42 PM
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). Mprove+: Privacy enhancing proof of reserves protocol for monero. IEEE Transactions on Information Forensics and Security, 16, 3900–3915.  
Last edited by: Rucknium 2/24/22, 7:18 PM
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].  
Last edited by: Rucknium 4/5/24, 10:13 PM
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 7/5/22, 5:03 PM
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting monero prices with a machine learning algorithm. Eskic{s}ehir Osmangazi "Universitesi .Iktisadi ve .Idari Bilimler Dergisi, 16(3), 651–663.  
Last edited by: Jack 1/20/23, 5:38 PM
Estensen, H. A. 2018. A comparison of monero and zcash.  
Last edited by: Jack 1/20/23, 5:40 PM
Fantazzini, D., & Kolodin, N. (2020). Does the hashrate affect the bitcoin price?. Journal of Risk and Financial Management, 13(11).  
Added by: endor 4/17/22, 9:15 PM
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2).  
Added by: Rucknium 10/22/22, 8:53 PM
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September A traceability analysis of monero’s blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS).  
Last edited by: Rucknium 2/23/22, 4:23 PM
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 9:04 PM
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.  
Added by: endor 4/17/22, 9:02 PM
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the security and performance of proof of work blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.  
Last edited by: endor 4/17/22, 7:53 PM
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-perceived privacy in blockchain. [Cryptology ePrint Archive, Report 2022/287].  
Added by: endor 4/17/22, 8:59 PM
Gibson, A. From zero (knowledge) to bulletproofs.  
Last edited by: Jack 3/3/23, 4:18 PM
Gligoroski, D. (2023). A transformation for lifting discrete logarithm based cryptography to post-quantum cryptography. Cryptology ePrint Archive,  
Last edited by: Jack 3/6/23, 10:32 PM
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 9:01 PM
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys. Cryptology ePrint Archive, Paper 2019/654,  
Last edited by: Jack 1/20/23, 5:53 PM
Goodell, B., & Noether, S. (2018). Thring signatures and their applications to spender-ambiguous digital currencies. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:51 PM
Goorha, P. Principles of natural resource economics for bitcoin. The Journal of The British Blockchain Association, 4(August).  
Last edited by: endor 4/14/22, 8:14 PM
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053.  
Last edited by: Rucknium 8/23/23, 4:52 PM
Gugger, J. 2020. Bitcoin-monero cross-chain atomic swap. [Cryptology ePrint Archive, Paper 2020/1126].  
Last edited by: Jack 1/20/23, 6:09 PM
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). Mrcc: A practical covert channel over monero with provable security. IEEE Access, 9, 31816–31825.  
Last edited by: Rucknium 8/6/22, 9:24 PM
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 9/10/22, 8:11 PM
Hoenisch, P., & Pino, L. S. D. (2021). Atomic swaps between bitcoin and monero. CoRR, abs/2101.12332,  
Last edited by: Rucknium 2/24/22, 6:54 PM
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650].  
Last edited by: Rucknium 12/13/22, 7:02 PM
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.  
Added by: Rucknium 10/22/22, 8:50 PM
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with multi-grained redaction. IEEE Transactions on Dependable and Secure Computing, 1–13.  
Added by: Rucknium 1/5/24, 7:16 PM
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies, 88(6), 3011–3040.  
Last edited by: endor 4/19/22, 11:07 PM
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110.  
Last edited by: Rucknium 1/5/24, 7:46 PM
Jivanyan, A., & Feickert, A. 2021. Lelantus spark: Secure and flexible private transactions. [Cryptology ePrint Archive, Report 2021/1173].  
Last edited by: Rucknium 2/24/22, 10:47 PM
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1).  
Last edited by: endor 4/17/22, 7:51 PM
Kawaguchi, K., & Noda, S. (2021). Security-cost efficiency of competing proof-of-work cryptocurrencies. Unpublished manuscript.  
Added by: Rucknium 2/23/22, 9:55 PM
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks. Array, 10, 100065.  
Added by: Rucknium 5/3/22, 3:13 AM
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection.  
Added by: Rucknium 10/22/22, 7:45 PM
koe. seraphis: a privacy-preserving transaction protocol abstraction (wip).  
Added by: Jack 3/8/23, 10:33 PM
koe, Alonso, K. M., & Noether, S. (2020). Zero to monero: A technical guide to a private digital currency; for beginners, amateurs, and experts second ed. Second ed.  
Last edited by: Rucknium 3/3/23, 4:51 PM
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891.  
Added by: Rucknium 9/10/22, 7:55 PM
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and analysis of the classical and post-quantum ring signature algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).  
Last edited by: Jack 1/20/23, 6:12 PM
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168.  
Added by: endor 4/17/22, 7:30 PM
Li, W., Lin, Z., & Chen, Q. (2022). A hybrid design of linkable ring signature scheme with stealth addresses. Security and Communication Networks, 2022,  
Added by: Rucknium 2/24/22, 3:44 PM
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-work cryptocurrency mining: A statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).  
Added by: endor 4/3/22, 6:53 PM
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.  
Added by: Rucknium 6/30/22, 10:22 PM
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing, 169, 301–316.  
Added by: Rucknium 9/10/22, 7:54 PM
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.  
Last edited by: Rucknium 5/5/22, 10:24 PM
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience.  
Added by: Rucknium 12/2/22, 4:05 PM
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size. Computer Standards & Interfaces, 80, 103562.  
Added by: Rucknium 2/24/22, 6:04 PM
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in monero. Journal of Computer Applications, 42(1).  
Added by: Rucknium 2/23/22, 5:01 PM
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). Msccs: A monero-based security-enhanced covert communication system. Computer Networks, 205, 108759.  
Added by: Rucknium 2/23/22, 10:46 PM
Luo, M., Zhou, J., & Yang, P. (2023). Rats: A regulatory anonymous transaction system based on blockchain. Journal of Parallel and Distributed Computing, 182, 104751.  
Added by: Rucknium 1/6/24, 5:44 PM
Macchetti, M. 2023. A novel related nonce attack for ecdsa. [Cryptology ePrint Archive, Paper 2023/305].  
Last edited by: Jack 3/6/23, 10:35 PM
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via merkle tree exploits within virtual currencies employing the cryptonote protocol. Unpublished manuscript.  
Last edited by: Rucknium 2/22/22, 5:58 PM
Macias, & Siabi, Y. E. Security analysis of monero’s peer-to-peer system.  
Last edited by: Jack 1/8/23, 2:45 PM
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving obfuscation in the cryptonote protocol. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:33 PM
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).  
Added by: endor 4/17/22, 7:40 PM
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.  
Added by: Rucknium 2/23/22, 10:08 PM
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association,  
Last edited by: Rucknium 5/3/22, 12:53 PM
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security.  
Last edited by: Jack 1/18/23, 12:01 AM
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.  
Added by: Rucknium 2/23/22, 4:14 PM
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).  
Added by: Rucknium 1/5/24, 7:14 PM
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155,  
Last edited by: Jack 7/29/23, 3:07 AM
Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. Unpublished manuscript.  
Last edited by: theadmin 2/23/22, 12:13 AM
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420.  
Added by: endor 4/17/22, 7:34 PM
1 - 100  |  101 - 200  |  201 - 210
WIKINDX 6.5.0 | Total resources: 210 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)