MoneroResearch.info

List Resources

Displaying 1 - 100  of 233 (Bibliography: WIKINDX Master Bibliography)
Parameters
Order by

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS).   
Added by: Jack   Last edited by: Jack 25/09/2024, 21:33
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171.   
Added by: Jack   Last edited by: Jack 19/09/2024, 22:59
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746.   
Added by: Rucknium   Last edited by: Rucknium 14/09/2024, 14:08
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables.   
Added by: Rucknium   Last edited by: Rucknium 13/09/2024, 13:39
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript.   
Added by: Rucknium 04/09/2024, 16:56
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript.   
Added by: opal 20/08/2024, 14:44
Feickert, A. (2024). Salvium review. Unpublished manuscript.   
Added by: opal   Last edited by: opal 20/08/2024, 14:33
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective.   
Added by: opal 25/09/2024, 21:35
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962.   
Added by: Rucknium 09/08/2024, 19:50
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425.   
Added by: Rucknium 09/08/2024, 18:32
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 18:07
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 18:02
Feickert, A. (2024). FCMP++ review. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 17:54
Parker, L. (2024). FCMP++. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 17:45
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript.   
Added by: Rucknium   Last edited by: Rucknium 09/08/2024, 17:41
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript.   
Added by: Rucknium 09/08/2024, 17:33
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network.   
Added by: Rucknium   Last edited by: Rucknium 01/08/2024, 16:27
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1).   
Added by: Rucknium 01/08/2024, 16:22
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303.   
Added by: Rucknium 10/07/2024, 16:09
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications.   
Added by: Jack   Last edited by: Jack 12/06/2024, 12:50
Yue, Z., Zhu, H., Chang, X., Mišić, J., Mišić, V. B., & Fan, J. 2024. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation.   
Added by: Rucknium   Last edited by: Rucknium 23/05/2024, 18:07
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1.   
Added by: Rucknium   Last edited by: Rucknium 23/05/2024, 18:01
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024.   
Added by: Rucknium 23/05/2024, 17:47
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review]   
Added by: Rucknium 05/04/2024, 22:08
Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil.   
Added by: Rucknium 05/04/2024, 22:07
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042].   
Added by: Rucknium   Last edited by: Rucknium 05/04/2024, 21:33
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.   
Added by: Rucknium 05/04/2024, 21:26
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15.   
Added by: Jack   Last edited by: Jack 27/02/2024, 13:42
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA).   
Added by: Rucknium   Last edited by: Rucknium 10/01/2024, 16:59
Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).   
Added by: Rucknium 06/01/2024, 17:58
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).   
Added by: Rucknium 06/01/2024, 17:53
Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin, IEEE Transactions on Sustainable Computing, 8(4), 574–582.   
Added by: Rucknium 06/01/2024, 17:50
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751.   
Added by: Rucknium 06/01/2024, 17:44
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications.   
Added by: Rucknium 06/01/2024, 17:36
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770.   
Added by: Rucknium 06/01/2024, 17:26
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security.   
Added by: Rucknium 06/01/2024, 17:22
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A Transaction-Level Model for Blockchain Privacy. [Cryptology ePrint Archive, Paper 2023/1902].   
Added by: Rucknium 06/01/2024, 17:04
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks, IEEE Transactions on Information Forensics and Security, 1–1.   
Added by: Rucknium 06/01/2024, 16:59
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May, Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP).   
Added by: Rucknium 06/01/2024, 16:50
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070].   
Added by: Rucknium   Last edited by: Rucknium 05/01/2024, 22:08
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis Universitat Oberta de Catalunya.   
Added by: Rucknium   Last edited by: Rucknium 05/01/2024, 22:01
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop.   
Added by: Rucknium 05/01/2024, 20:51
Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript.   
Added by: Rucknium 05/01/2024, 20:32
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110.   
Added by: Rucknium   Last edited by: Rucknium 05/01/2024, 19:46
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146.   
Added by: Rucknium 05/01/2024, 19:23
Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).   
Added by: Rucknium 05/01/2024, 19:13
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).   
Added by: Rucknium 05/01/2024, 19:14
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13.   
Added by: Rucknium 05/01/2024, 19:16
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053.   
Added by: Rucknium   Last edited by: Rucknium 23/08/2023, 16:52
Rosenfeld, M. 2014. Analysis of Hashrate-Based Double Spending.   
Added by: Rucknium   Last edited by: Rucknium 23/08/2023, 16:48
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains, arXiv preprint arXiv:2306.14272.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:09
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:07
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:05
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High Assurance Specification of the halo2 Protocol.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:03
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 29/07/2023, 02:59
Wang, X., Lin, L., & Wang, Y. (2023). Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring, The Computer Journal, bxad056.   
Added by: Jack   Last edited by: Jack 07/06/2023, 12:27
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 06/06/2023, 21:13
Yu, G. (2020). Blockchain stealth address schemes, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 06/06/2023, 21:04
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.   
Added by: Jack   Last edited by: Jack 06/06/2023, 21:02
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger, IEEE Access, 10, 42067–42082.   
Added by: Jack   Last edited by: Jack 29/03/2023, 18:12
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334.   
Added by: Jack   Last edited by: Jack 28/03/2023, 21:58
Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.   
Added by: Jack   Last edited by: Jack 29/03/2023, 18:12
Noether, S. UNDERSTANDING GE FROMFE FROMBYTES VARTIME.   
Added by: Jack   Last edited by: Jack 28/03/2023, 21:26
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, MatRiCT+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).   
Added by: Jack   Last edited by: Jack 28/03/2023, 20:46
koe. Seraphis: A Privacy-Preserving Transaction Protocol Abstraction (WIP).   
Added by: Jack 08/03/2023, 22:33
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305].   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:35
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:32
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain Privacy Notions Using the Transaction Graph Model. University of Fribourg.   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:29
Cremers, C., Loss, J., & Wagner, B. 2023. A Holistic Security Analysis of Monero Transactions. [Cryptology ePrint Archive, Paper 2023/321].   
Added by: Jack   Last edited by: Jack 08/03/2023, 18:11
Alonso, K. M. (2017). Monero-privacy in the blockchain. Universitat Aut`onoma de Barcelona.   
Added by: Jack   Last edited by: Jack 03/03/2023, 16:55
Gibson, A. From Zero (Knowledge) to Bulletproofs.   
Added by: Jack   Last edited by: Jack 03/03/2023, 16:18
Kappos, G. (2022). An Empirical Analysis of Privacy in Cryptocurrencies. Unpublished PhD thesis, UCL (University College London).   
Added by: Jack   Last edited by: Jack 21/02/2023, 04:36
Amarasinghe, N. (2022). Systematic Modelling of Anonymity with Application to Cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology.   
Added by: Jack   Last edited by: Jack 21/02/2023, 04:34
Taneska, M., & Halimi, F. 2022, Anonymous Blockchain based model for e-Voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022.   
Added by: Jack   Last edited by: Jack 21/02/2023, 04:30
Rucknium, R. Fully Specified Estimation Plan for Optimal Static Parametric Estimation of Arbitrary Distributions (OSPEAD) Public Version. Monero Research Lab.   
Added by: Jack   Last edited by: Jack 20/01/2023, 04:31
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies.   
Added by: Jack   Last edited by: Jack 20/01/2023, 04:16
USA v. LICHTENSTEIN et al. February 7 2022. US Dept. of Justice.   
Added by: Jack   Last edited by: Jack 20/01/2023, 03:41
Open Letter to FinCEN’s Proposed Amendment of the BSA. October 24 2020. FinCEN.   
Added by: Jack   Last edited by: Jack 20/01/2023, 03:41
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical Analysis of Silent Mining Operation in the Monero System, Studies in Informatics and Control, 30(4), 99–108.   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:21
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).   
Added by: Jack 20/01/2023, 18:34
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:12
Christensen, S. 2018. A Comparative Study of Privacy-Preserving Cryptocurrencies: Monero and ZCash. University of Birmingham.   
Added by: Jack   Last edited by: Jack 20/01/2023, 17:36
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 10 of 10--Stealth addresses.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:44
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 9 of 10--RingCT and anatomy of Monero transactions.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:44
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 8 of 10--Introduction to Pedersen Commitments and Confidential Transactions.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:43
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 7 of 10--Multilayered Linkable Spontaneous Anonymous Group (MLSAG) signature scheme.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:43
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:42
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 5 of 10--Cryptonote’s linkable ring signature scheme.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:41
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 4 of 10--Herranz & Saez Generic Ring Signature Scheme [1].   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:40
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 3 of 10--Introduction to Ring Signatures.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:40
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 2 of 10--Pointcheval & Stern’s Generic Signature Scheme.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:39
Seguias, B. E. K. 2018. Monero’s Building Blocks Part 1 of 10--Prerequisites.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:38
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:12
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s Monero Drive-by Crypto-jacking, IOP Conference Series: Materials Science and Engineering, 769(1), 12065.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:05
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security.   
Added by: Jack   Last edited by: Jack 18/01/2023, 00:01
Gugger, J. 2020. Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126].   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:09
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-Money Laundering Regulation of Privacy Enabling Cryptocurrencies.   
Added by: Jack   Last edited by: Jack 08/01/2023, 16:44
Azad, B. A. 2018. Evaluating the Effectiveness of JavaScript Crypto Miner Blocker Browser Extensions. StonyBrook University.   
Added by: Jack   Last edited by: Jack 20/01/2023, 17:59
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting Monero Prices with a Machine Learning Algorithm, Eski{\c{s}}ehir Osmangazi {\"U}niversitesi {\.I}ktisadi ve {\.I}dari Bilimler Dergisi, 16(3), 651–663.   
Added by: Jack   Last edited by: Jack 20/01/2023, 17:38
Chator, A., & Green, M. 2018, How to squeeze a crowd: reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:05
1 - 100  |  101 - 200  |  201 - 233
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced