-
1
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer R. (ed.)., Lecture Notes in Computer Science. Springer: Springer-Verlag Berlin, Heidelberg
-
Sahai A, Waters B,. Fuzzy identity-based encryption. In Eurocrypt, vol. 3494, Cramer R, (ed.)., Lecture Notes in Computer Science. Springer: Springer-Verlag Berlin, Heidelberg, 2005; 457-473.
-
(2005)
Eurocrypt
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
2
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM Press: ACM New York, NY, USA
-
Goyal V, Pandey O, Sahai A, Waters B,. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006, Alexandria, VA, USA. ACM Press: ACM New York, NY, USA, 2006; 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006, Alexandria, VA, USA
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
3
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo M, Okamoto E,. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions 1997; E80-A (1): 54-63.
-
(1997)
IEICE Transactions
, vol.80
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg K. (ed.). Springer: Springer Berlin Heidelberg
-
Blaze M, Bleumer G, Strauss M,. Divertible protocols and atomic proxy cryptography. In Proceedings of Advances in Cryptology-EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin, Vol. 1403, Nyberg K, (ed.). Springer: Springer Berlin Heidelberg, 1998; 127-144.
-
(1998)
Proceedings of Advances in Cryptology - EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese G, Fu K, Green M, Hohenberger S,. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security 2006; 9 (1): 1-30.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
6
-
-
84990717231
-
Performance benefits of non-volatile caches in distributed file systems
-
Biswas P, Towsley D, Ramakrishnan KK, Krishna CM,. Performance benefits of non-volatile caches in distributed file systems. Concurrency: Practice and Experience 1994; 6 (4): 289-323.
-
(1994)
Concurrency: Practice and Experience
, vol.6
, Issue.4
, pp. 289-323
-
-
Biswas, P.1
Towsley, D.2
Ramakrishnan, K.K.3
Krishna, C.M.4
-
7
-
-
80051514746
-
Achieving fine-grained access control for secure data sharing on cloud servers
-
Wang G, Liu Q, Wu J,. Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience 2011; 23 (12): 1443-1464.
-
(2011)
Concurrency and Computation: Practice and Experience
, vol.23
, Issue.12
, pp. 1443-1464
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
8
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
ACM Press: Sydney, Australia
-
Weng J, Deng RH, Ding X, Chu C-K, Lai J,. Conditional proxy re-encryption secure against chosen-ciphertext attack. In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009. ACM Press: Sydney, Australia, 2009; 322-332.
-
(2009)
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.-K.4
Lai, J.5
-
9
-
-
58149244202
-
-
ACNS '07, Springer
-
Green M, Ateniese G,. Identity-based proxy re-encryption, In ACNS '07, vol. 4512. Springer, 2007; 288-306.
-
(2007)
Identity-based Proxy Re-encryption
, vol.4512
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
10
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
ACM Press: ACM New York, NY, USA
-
Liang X, Cao Z, Lin H, Shao J,. Attribute based proxy re-encryption with delegating capabilities. In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009, Sydney, Australia. ACM Press: ACM New York, NY, USA, 2009; 276-286.
-
(2009)
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2009, Sydney, Australia
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
12
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
Dunkelman O. (ed.). Springer: Springer Berlin Heidelberg
-
Hanaoka G, Kawai Y, Kunihiro N, Matsuda T, Weng J, Zhang R, Zhao Y,. Generic construction of chosen ciphertext secure proxy re-encryption. In Proceedings of Topics in Cryptology-CT-RSA 2012-The Cryptographers'Track at the RSA Conference 2012 (Lecture Notes in Computer Science), Berlin, Vol. 7178, Dunkelman O, (ed.). Springer: Springer Berlin Heidelberg, 2012; 349-364.
-
(2012)
Proceedings of Topics in Cryptology - CT-RSA 2012 - The cryptographers'Track at the RSA Conference 2012 (Lecture Notes in Computer Science), Berlin
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
13
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin C. Camenisch J. (eds). Springer: Springer Berlin Heidelberg
-
Canetti R, Halevi S, Katz J,. Chosen-ciphertext security from identity-based encryption. In Proceedings of Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin, Vol. 3027, Cachin C, Camenisch J, (eds). Springer: Springer Berlin Heidelberg, 2004; 207-222.
-
(2004)
Proceedings of Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Boneh D. (ed.). Springer: Springer Berlin Heidelberg
-
Canetti R, Krawczyk H, Nielsen JB,. Relaxing chosen-ciphertext security. In Proceedings of Advances in Cryptology-CRYPTO 2003, 23rd Annual International Cryptology Conference (Lecture Notes in Computer Science), Berlin, Vol. 2729, Boneh D, (ed.). Springer: Springer Berlin Heidelberg, 2003; 565-582.
-
(2003)
Proceedings of Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference (Lecture Notes in Computer Science), Berlin
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
15
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer R. (ed.). Springer: Springer Berlin Heidelberg
-
Libert B, Vergnaud D,. Unidirectional chosen-ciphertext secure proxy re-encryption. In Proceedings of Public Key Cryptography-PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography (Lecture Notes in Computer Science), Berlin, Vol. 4939, Cramer R, (ed.). Springer: Springer Berlin Heidelberg, 2008; 360-379.
-
(2008)
Proceedings of Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography (Lecture Notes in Computer Science), Berlin
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
16
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Garay J.A. Lenstra A.K. Mambo M. Peralta R. (eds). Springer: Springer Berlin Heidelberg
-
Chu CK, Tzeng WG,. Identity-based proxy re-encryption without random oracles. In Proceedings of Information Security, 10th International Conference (Lecture Notes in Computer Science), Berlin, Vol. 4779, Garay JA, Lenstra AK, Mambo M, Peralta R, (eds). Springer: Springer Berlin Heidelberg, 2007; 189-202.
-
(2007)
Proceedings of Information Security, 10th International Conference (Lecture Notes in Computer Science), Berlin
, vol.4779
, pp. 189-202
-
-
Chu, C.K.1
Tzeng, W.G.2
-
17
-
-
79961066267
-
A timed-release proxy re-encryption scheme
-
Emura K, Miyaji A, Omote K,. A timed-release proxy re-encryption scheme. IEICE Transactions 2011; 94-A (8): 1682-1695.
-
(2011)
IEICE Transactions
, vol.94
, Issue.8
, pp. 1682-1695
-
-
Emura, K.1
Miyaji, A.2
Omote, K.3
-
18
-
-
78650865160
-
Ciphertext policy attribute-based proxy re-encryption
-
Soriano M. Qing S. k, Lõpez J. (eds). Springer: Springer Berlin Heidelberg
-
Luo S, Hu J, Chen Z,. Ciphertext policy attribute-based proxy re-encryption. In Proceedings of Information and Communications Security-12th International Conference (Lecture Notes in Computer Science), Berlin, Vol. 6476, Soriano M, Qing S k, Lõpez J, (eds). Springer: Springer Berlin Heidelberg, 2010; 401-415.
-
(2010)
Proceedings of Information and Communications Security - 12th International Conference (Lecture Notes in Computer Science), Berlin
, vol.6476
, pp. 401-415
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
19
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society Press: Oakland, California, USA
-
Bethencourt J, Sahai A, Waters B,. Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2007. IEEE Computer Society Press: Oakland, California, USA, 2007; 321-334.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
20
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
ACM Press: ACM New York, NY, USA
-
Cheung L, Newport CC,. Provably secure ciphertext policy ABE. In Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS), October 2007, Alexandria, Virginia, USA. ACM Press: ACM New York, NY, USA, 2007; 456-465.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS), October 2007, Alexandria, Virginia, USA
, pp. 456-465
-
-
Cheung, L.1
Newport, C.C.2
-
21
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Aceto L. Damgård I. Goldberg L.A. Halldõrsson M.M. Ingõlfsdõttir A. Walukiewicz I. (eds). Springer: Springer-Verlag Berlin, Heidelberg
-
Goyal V, Jain A, Pandey O, Sahai A,. Bounded ciphertext policy attribute based encryption. In Proceedings of Automata, Languages and Programming, 35th International Colloquium, ICALP: Part II-Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations (Lecture Notes in Computer Science), Berlin, Vol. 5126, Aceto L, Damgård I, Goldberg LA, Halldõrsson MM, Ingõlfsdõttir A, Walukiewicz I, (eds). Springer: Springer-Verlag Berlin, Heidelberg, 2008; 579-591.
-
(2008)
Proceedings of Automata, Languages and Programming, 35th International Colloquium, ICALP: Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations (Lecture Notes in Computer Science), Berlin
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
22
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Catalano D. Fazio N. Gennaro R. Nicolosi A. (eds). Springer: Springer Berlin Heidelberg
-
Waters B,. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of Public Key Cryptography-PKC 2011-14th International Conference on Practice and Theory in Public Key Cryptography (Lecture Notes in Computer Science), Berlin, Vol. 6571, Catalano D, Fazio N, Gennaro R, Nicolosi A, (eds). Springer: Springer Berlin Heidelberg, 2011; 53-70.
-
(2011)
Proceedings of Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography (Lecture Notes in Computer Science), Berlin
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
23
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Gilbert H. (ed.). Springer: Springer Berlin Heidelberg
-
Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B,. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In Proceedings of Advances in Cryptology-EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin, Vol. 6110, Gilbert H, (ed.). Springer: Springer Berlin Heidelberg, 2010; 62-91.
-
(2010)
Proceedings of Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Berlin
, vol.6110
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
24
-
-
84865479255
-
New proof methods for attribute-based encryption: Achieving full security through selective techniques
-
Safavi-Naini R. Canetti R. (eds). Springer: Springer Berlin Heidelberg
-
Lewko AB, Waters B,. New proof methods for attribute-based encryption: achieving full security through selective techniques. In Proceedings of Advances in Cryptology-CRYPTO 2012-32nd Annual Cryptology Conference (Lecture Notes in Computer Science), Berlin, Vol. 7417, Safavi-Naini R, Canetti R, (eds). Springer: Springer Berlin Heidelberg, 2012; 180-198.
-
(2012)
Proceedings of Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference (Lecture Notes in Computer Science), Berlin
, vol.7417
, pp. 180-198
-
-
Lewko, A.B.1
Waters, B.2
-
25
-
-
84856602103
-
Attribute-based encryption schemes with constant-size ciphertexts
-
Attrapadung N, Herranz J, Laguillaumie F, Libert B, Panafieu ED, Rafols C,. Attribute-based encryption schemes with constant-size ciphertexts. Theoretical Computer Science 2012; 422 (0): 15-38.
-
(2012)
Theoretical Computer Science
, vol.422
, Issue.0
, pp. 15-38
-
-
Attrapadung, N.1
Herranz, J.2
Laguillaumie, F.3
Libert, B.4
Panafieu, E.D.5
Rafols, C.6
-
26
-
-
84865452842
-
Functional encryption for regular languages
-
Safavi-Naini R. Canetti R. (eds). Springer: Springer Berlin Heidelberg
-
Waters B,. Functional encryption for regular languages. In Proceedings of Advances in Cryptology-CRYPTO 2012-32nd Annual Cryptology Conference (Lecture Notes in Computer Science), Berlin, Vol. 7417, Safavi-Naini R, Canetti R, (eds). Springer: Springer Berlin Heidelberg, 2012; 218-235.
-
(2012)
Proceedings of Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference (Lecture Notes in Computer Science), Berlin
, vol.7417
, pp. 218-235
-
-
Waters, B.1
-
27
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
Cheung B.S.N. Hui L.C.K. Sandhu R.S. Wong D.S. (eds). ACM Press: ACM New York, NY, USA
-
Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D,. Multi-authority ciphertext-policy attribute-based encryption with accountability. In Proceedings of the 2011 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2011, Hong Kong, China, Cheung BSN, Hui LCK, Sandhu RS, Wong DS, (eds). ACM Press: ACM New York, NY, USA, 2011; 386-390.
-
(2011)
Proceedings of the 2011 ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2011, Hong Kong, China
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
28
-
-
57949106557
-
Proxy Cryptography Revisited
-
The Internet Society Press: San Diego, California, USA
-
Ivan AA, Dodis Y,. Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2003. The Internet Society Press: San Diego, California, USA, 2003.
-
(2003)
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2003
-
-
Ivan, A.A.1
Dodis, Y.2
-
29
-
-
84883342901
-
A conditional proxy broadcast re-encryption scheme supporting timed-release
-
Deng R.H. Feng T. (eds). Springer. Lecture Notes in Computer Science
-
Liang K, Qiong H, Schlegel R, Wong DS, Tang C,. A conditional proxy broadcast re-encryption scheme supporting timed-release. In Proceedings of Information Security Practice and Experience-9th International Conference, Vol. 7863, Deng RH, Feng T, (eds). Springer. Lecture Notes in Computer Science, 2013; 132-146.
-
(2013)
Proceedings of Information Security Practice and Experience - 9th International Conference
, vol.7863
, pp. 132-146
-
-
Liang, K.1
Qiong, H.2
Schlegel, R.3
Wong, D.S.4
Tang, C.5
-
30
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Ning P. diVimercati S.D.C. Syverson P.F. (eds). ACM Press: ACM New York, NY, USA
-
Canetti R, Hohenberger S,. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS), October 2007, Alexandria, Virginia, USA, Ning P, diVimercati SDC, Syverson PF, (eds). ACM Press: ACM New York, NY, USA, 2007; 185-194.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS), October 2007, Alexandria, Virginia, USA
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
31
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from CT-RSA 2012
-
Dawson (ed.). Springer: Berlin
-
Isshiki T, Nguyen MH, Tanaka K,. Proxy re-encryption in a stronger security model extended from CT-RSA 2012. In Proceedings of Topics in Cryptology-CT-RSA 2013-The Cryptographers' Track at the RSA Conference 2013 (Lecture Notes in Computer Science), Vol. 7779, Dawson, (ed.). Springer: Berlin, 2013; 277-292.
-
(2013)
Proceedings of Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013 (Lecture Notes in Computer Science)
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
32
-
-
78650185456
-
Hybrid proxy re-encryption scheme for attribute-based encryption
-
Bao F. Yung M. Lin D. Jing J. (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg
-
Mizuno T, Doi H,. Hybrid proxy re-encryption scheme for attribute-based encryption. In Inscrypt, Vol. 6151, Bao F, Yung M, Lin D, Jing J, (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg, 2009; 288-302.
-
(2009)
Inscrypt
, vol.6151
, pp. 288-302
-
-
Mizuno, T.1
Doi, H.2
-
33
-
-
84890070570
-
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
-
Liang K, Fang L, Susilo W, Wong DS,. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security, 2013; 552-559. IEEE.
-
(2013)
IEEE
, pp. 552-559
-
-
Liang, K.1
Fang, L.2
Susilo, W.3
Wong, D.S.4
-
34
-
-
0003745894
-
-
Ph.D. Thesis, Israel Institute of Technology, Technion, Haifa, Israel
-
Beimel A,. Secure schemes for secret sharing and key distribution. Ph.D. Thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
35
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer R, Shoup V,. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 2004; 33 (1): 167-226.
-
(2004)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
36
-
-
84878478447
-
Secure integration of asymmetric and symmetric encryption schemes
-
Fujisaki E, Okamoto T,. Secure integration of asymmetric and symmetric encryption schemes. J. Cryptology 2013; 26 (1): 80-101.
-
(2013)
J. Cryptology
, vol.26
, Issue.1
, pp. 80-101
-
-
Fujisaki, E.1
Okamoto, T.2
-
37
-
-
84875985547
-
A CCA-secure identity-based conditional proxy re-encryption without random oracles
-
Kwon T. Lee M.K. Kwon D. (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg
-
Liang K, Liu Z, Tan X, Wong DS, Tang C,. A CCA-secure identity-based conditional proxy re-encryption without random oracles. In Icisc, Vol. 7839, Kwon T, Lee MK, Kwon D, (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg, 2012; 231-246.
-
(2012)
Icisc
, vol.7839
, pp. 231-246
-
-
Liang, K.1
Liu, Z.2
Tan, X.3
Wong, D.S.4
Tang, C.5
|