-
1
-
-
84886653936
-
Novel anonymous authentication scheme using smart cards
-
Nov
-
J.-L. Tsai, N.-W. Lo, and T.-C. Wu"Novel anonymous authentication scheme using smart cards"IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013
-
(2013)
IEEE Trans. Ind. Informat
, vol.9
, Issue.4
, pp. 2004-2013
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
2
-
-
84894646273
-
Cloudbased augmentation for mobile devices: Motivation, taxonomies, and open challenges
-
First Quarter
-
S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya"Cloudbased augmentation for mobile devices: Motivation, taxonomies, and open challenges"IEEE Commun. Surv. Tuts., vol. 16, no. 1, pp. 337-368, First Quarter 2014
-
(2014)
IEEE Commun. Surv. Tuts
, vol.16
, Issue.1
, pp. 337-368
-
-
Abolfazli, S.1
Sanaei, Z.2
Ahmed, E.3
Gani, A.4
Buyya, R.5
-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Austria: Springer-Verlag
-
R. Canetti and H. Krawczyk"Analysis of key-exchange protocols and their use for building secure channels"in Advances in Cryptology. Innsbruck, Austria: Springer-Verlag, 2001, pp. 453-474
-
(2001)
Advances in Cryptology. Innsbruck
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
84863345554
-
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
May/Jun
-
E. Brickell and J. Li"Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities"IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 345-360, May/Jun. 2012
-
(2012)
IEEE Trans. Dependable Secure Comput
, vol.9
, Issue.3
, pp. 345-360
-
-
Brickell, E.1
Li, J.2
-
6
-
-
84903203451
-
Further observations on smart-card-based password-Authenticated key agreement in distributed systems
-
Jul
-
X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu"Further observations on smart-card-based password-Authenticated key agreement in distributed systems"IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1767-1775, Jul. 2014
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.7
, pp. 1767-1775
-
-
Huang, X.1
Chen, X.2
Li, J.3
Xiang, Y.4
Xu, L.5
-
7
-
-
84938203187
-
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
-
to be published
-
D. Wang, D. He, P. Wang, and C. Chu"Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment"IEEE Trans. Dependable Secure Comput., to be published
-
IEEE Trans. Dependable Secure Comput
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.4
-
8
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S. Wu, Y. Zhu, and Q. Pu"Robust smart-cards-based user authentication scheme with user anonymity"Secur. Commun. Netw., vol. 5, no. 2, pp. 236-248, 2012
-
(2012)
Secur. Commun. Netw
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
9
-
-
84914669082
-
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme
-
S. Kumari and M. K. Khan"Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme, Int. J. Commun. Syst., vol. 27, no. 12, pp. 3939-3955, 2014
-
(2014)
Int. J. Commun. Syst
, vol.27
, Issue.12
, pp. 3939-3955
-
-
Kumari, S.1
Khan, M.K.2
-
10
-
-
84893037497
-
Cryptanalysis and improvement of 'an efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
-
M. K. Khan and S. Kumari"Cryptanalysis and improvement of 'an efficient and secure dynamic ID-based authentication scheme for telecare medical information systems, Secur. Commun. Netw., vol. 7, no. 2, pp. 399-408, 2014
-
(2014)
Secur. Commun. Netw
, vol.7
, Issue.2
, pp. 399-408
-
-
Khan, M.K.1
Kumari, S.2
-
11
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
Feb
-
D. He, J. Bu, S. Chan, C. Chen, and M. Yin"Privacy-preserving universal authentication protocol for wireless communications"IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, Feb. 2011
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
12
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
L. Wu, Y. Zhang, and F. Wang"A new provably secure authentication and key agreement protocol for SIP using ECC"Comput. Standards Interf., vol. 31, no. 2, pp. 286-291, 2009
-
(2009)
Comput. Standards Interf
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
13
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport"Password authentication with insecure communication"Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981
-
(1981)
Commun ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
0035506864
-
A remote password authentication scheme for multiserver architecture using neural networks
-
Nov
-
L.-H. Li, I.-C. Lin, and M.-S. Hwang"A remote password authentication scheme for multiserver architecture using neural networks"IEEE Trans. Neural Netw., vol. 12, no. 6, pp. 1498-1504, Nov. 2001
-
(2001)
IEEE Trans. Neural Netw
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.-H.1
Lin, I.-C.2
Hwang, M.-S.3
-
15
-
-
84904545458
-
Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards
-
Ottawa, ON, Canada, May
-
T.-Y. Chen, C.-H. Ling, and M.-S. Hwang"Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards"in Proc. IEEE Workshop Electron., Comput. Appl., Ottawa, ON, Canada, May 2014, pp. 771-774
-
(2014)
Proc IEEE Workshop Electron., Comput. Appl
, pp. 771-774
-
-
Chen, T.-Y.1
Ling, C.-H.2
Hwang, M.-S.3
-
16
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
Feb
-
W.-S. Juang"Efficient multi-server password authenticated key agreement using smart cards"IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 251-255, Feb. 2004
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.-S.1
-
17
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
H.-C. Hsiang and W.-K. Shih"Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment"Comput. Standards Interf., vol. 31, no. 6, pp. 1118-1123, 2009
-
(2009)
Comput. Standards Interf
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
18
-
-
84888003168
-
Towards secure and efficient user authentication scheme using smart card for multiserver environments
-
T.-Y. Chen, C.-C. Lee, M.-S. Hwang, and J.-K. Jan"Towards secure and efficient user authentication scheme using smart card for multiserver environments"J. Supercomput., vol. 66, no. 2, pp. 1008-1032, 2013
-
(2013)
J. Supercomput
, vol.66
, Issue.2
, pp. 1008-1032
-
-
Chen, T.-Y.1
Lee, C.-C.2
Hwang, M.-S.3
Jan, J.-K.4
-
19
-
-
84880841622
-
A new password-based multi-server authentication scheme robust to password guessing attacks
-
J.-L. Tsai, N.-W. Lo, and T.-C. Wu"A new password-based multi-server authentication scheme robust to password guessing attacks"Wireless Pers. Commun., vol. 71, no. 3, pp. 1977-1988, 2013
-
(2013)
Wireless Pers. Commun
, vol.71
, Issue.3
, pp. 1977-1988
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
20
-
-
84872320813
-
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
-
E.-J. Yoon and K.-Y. Yoo"Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem"J. Supercomput., vol. 63, no. 1, pp. 235-255, 2013
-
(2013)
J. Supercomput
, vol.63
, Issue.1
, pp. 235-255
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
21
-
-
84863921912
-
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
-
Salvador, Brazil
-
H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won"Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme"in Proc. 12th Int. Conf. Comput. Sci. Appl. (ICCSA), Salvador, Brazil, 2012, pp. 391-406
-
(2012)
Proc. 12th Int. Conf. Comput. Sci. Appl. (ICCSA)
, pp. 391-406
-
-
Kim, H.1
Jeon, W.2
Lee, K.3
Lee, Y.4
Won, D.5
-
22
-
-
84902111117
-
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
-
Tech. Rep. 2011/365
-
D. He. (2011)."Security flaws in a biometrics-based multi-server authentication with key agreement scheme"IACR Cryptol. ePrint Arch., Tech. Rep. 2011/365, pp. 1-9
-
(2011)
IACR Cryptol. EPrint Arch
, pp. 1-9
-
-
He, D.1
-
23
-
-
84937871044
-
-
[Online]. Available: http://eprint.iacr.org/2011/365.pdf
-
-
-
-
24
-
-
84937926060
-
Robust biometrics-based authentication scheme for multiserver environment
-
to be published
-
D. He and D. Wang"Robust biometrics-based authentication scheme for multiserver environment"IEEE Syst. J., to be published
-
IEEE Syst. J.
-
-
He, D.1
Wang, D.2
-
25
-
-
0002326595
-
Biometric identification
-
A. Jain, L. Hong, and S. Pankanti"Biometric identification"Commun. ACM, vol. 43, no. 2, pp. 90-98, 2000
-
(2000)
Commun ACM
, vol.43
, Issue.2
, pp. 90-98
-
-
Jain, A.1
Hong, L.2
Pankanti, S.3
-
26
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle"Enhancing security and privacy in biometrics-based authentication systems"IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
27
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Feb
-
K. Lauter"The advantages of elliptic curve cryptography for wireless security"IEEE Wireless Commun., vol. 11, no. 1, pp. 62-67, Feb. 2004
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
28
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA
-
P. C. Kocher, J. Jaffe, and B. Jun"Differential power analysis"in Proc. 19th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO), vol. 1666. Santa Barbara, CA, USA, 1999, pp. 388-397
-
(1999)
Proc. 19th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
29
-
-
0036566408
-
Examining smartcard security under the threat of power analysis attacks
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan"Examining smartcard security under the threat of power analysis attacks"IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
30
-
-
0020720357
-
On the security of public key protocols
-
Mar
-
D. Dolev and A. C. Yao"On the security of public key protocols"IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
32
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Dec, Art. ID 33
-
P. Sarkar"A simple and generic construction of authenticated encryption with associated data"ACM Trans. Inf. Syst. Secur., vol. 13, no. 4, Dec. 2010, Art. ID 33
-
(2010)
ACM Trans. Inf. Syst. Secur
, vol.13
, Issue.4
-
-
Sarkar, P.1
-
33
-
-
30744432873
-
Some observations on the theory of cryptographic hash functions
-
D. R. Stinson"Some observations on the theory of cryptographic hash functions"Designs, Codes Cryptogr., vol. 38, no. 2, pp. 259-277, 2006
-
(2006)
Designs, Codes Cryptogr
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
34
-
-
0742290133
-
An introduction to biometric recognition
-
Jan
-
A. K. Jain, A. Ross, and S. Prabhakar"An introduction to biometric recognition"IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4-20, Jan. 2004
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
35
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Switzerland: Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data"in Advances in Cryptology. Interlaken, Switzerland: Springer-Verlag, 2004, pp. 523-540
-
(2004)
Advances in Cryptology. Interlaken
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
36
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
A. K. Das"Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards"IET Inf. Secur., vol. 5, no. 3, pp. 145-151, 2011
-
(2011)
IET Inf. Secur
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
37
-
-
84858401168
-
A framework for analyzing template security and privacy in biometric authentication systems
-
Apr
-
K. Simoens, J. Bringer, H. Chabanne, and S. Seys"A framework for analyzing template security and privacy in biometric authentication systems"IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 833-841, Apr. 2012
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 833-841
-
-
Simoens, K.1
Bringer, J.2
Chabanne, H.3
Seys, S.4
-
38
-
-
84907510051
-
A novel serial multimodal biometrics framework based on semisupervised learning techniques
-
Oct
-
Q. Zhang, Y. Yin, D.-C. Zhan, and J. Peng"A novel serial multimodal biometrics framework based on semisupervised learning techniques"IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1681-1694, Oct. 2014
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.10
, pp. 1681-1694
-
-
Zhang, Q.1
Yin, Y.2
Zhan, D.-C.3
Peng, J.4
-
39
-
-
78649427215
-
Soft biometric traits for continuous user authentication
-
Dec
-
K. Niinuma, U. Park, and A. K. Jain"Soft biometric traits for continuous user authentication"IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 771-780, Dec. 2010
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 771-780
-
-
Niinuma, K.1
Park, U.2
Jain, A.K.3
-
40
-
-
85032751447
-
Privacy-preserving speech processing: Cryptographic and string-matching frameworks show promise
-
Mar
-
M. A. Pathak, B. Raj, S. D. Rane, and P. Smaragdis"Privacy-preserving speech processing: Cryptographic and string-matching frameworks show promise"IEEE Signal Process. Mag., vol. 30, no. 2, pp. 62-74, Mar. 2013
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.2
, pp. 62-74
-
-
Pathak, M.A.1
Raj, B.2
Rane, S.D.3
Smaragdis, P.4
-
41
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
Quebec City, QC, Canada
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain"FVC2002: Second fingerprint verification competition"in Proc. 16th Int. Conf. Pattern Recognit. (ICPR), Quebec City, QC, Canada, 2002, pp. 811-814
-
(2002)
Proc. 16th Int. Conf. Pattern Recognit. (ICPR)
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
42
-
-
10044279790
-
-
accessed Feb 2015
-
P. J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. FRVT 2002: Overview and Summary [Online]. Available: https://epic.org/privacy/surveillance/spotlight/1105/nist0303. pdf, accessed Feb. 2015
-
FRVT 2002: Overview and Summary
-
-
Phillips, P.J.1
Grother, P.2
Micheals, R.J.3
Blackburn, D.M.4
Tabassi, E.5
Bone, J.M.6
-
43
-
-
61449086383
-
User authentication scheme with privacy-preservation for multi-server environment
-
Feb
-
R.-C. Wang, W.-S. Juang, and C.-L. Lei"User authentication scheme with privacy-preservation for multi-server environment"IEEE Commun. Lett., vol. 13, no. 2, pp. 157-159, Feb. 2009
-
(2009)
IEEE Commun. Lett
, vol.13
, Issue.2
, pp. 157-159
-
-
Wang, R.-C.1
Juang, W.-S.2
Lei, C.-L.3
-
44
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
X. Li, J.-W. Niu, J. Ma, W.-D. Wang, and C.-L. Liu"Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards"J. Netw. Comput. Appl., vol. 34, no. 1, pp. 73-79, 2011
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.-W.2
Ma, J.3
Wang, W.-D.4
Liu, C.-L.5
-
45
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Aug
-
X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng"A generic framework for three-factor authentication: Preserving security and privacy in distributed systems"IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011
-
(2011)
IEEE Trans. Parallel Distrib. Syst
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
46
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham"A logic of authentication"ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, 1990
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
47
-
-
84937834943
-
-
AVISPA: Automated Validation of Internet Security Protocols and Applications [accessed Jan 2013
-
AVISPA: Automated Validation of Internet Security Protocols and Applications [Online]. Available: http://www.avispa-project.org/, accessed Jan. 2013
-
-
-
-
48
-
-
84870657665
-
An novel three-party authenticated key exchange protocol using one-time key
-
C. Lv, M. Ma, H. Li, J. Ma, and Y. Zhang"An novel three-party authenticated key exchange protocol using one-time key"J. Netw. Comput. Appl., vol. 36, no. 1, pp. 498-503, 2013
-
(2013)
J. Netw. Comput. Appl
, vol.36
, Issue.1
, pp. 498-503
-
-
Lv, C.1
Ma, M.2
Li, H.3
Ma, J.4
Zhang, Y.5
-
49
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
D. Basin, S. Mödersheim, and L. Vigano"OFMC: A symbolic model checker for security protocols"Int. J. Inf. Secur., vol. 4, no. 3, pp. 181-208, 2005
-
(2005)
Int. J. Inf. Secur
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Vigano, L.3
-
50
-
-
84937907026
-
-
FIPS PUB 180-1, Secure Hash Standard, U.S. Dept. Commerce, Nat. Inst. Standards Technol., Washington, DC, USA Apr
-
FIPS PUB 180-1, Secure Hash Standard, U.S. Dept. Commerce, Nat. Inst. Standards Technol., Washington, DC, USA, Apr. 1995
-
(1995)
-
-
-
51
-
-
84937911079
-
-
National Institute of Standards and Technology NIST U.S. Department of Commerce. (Nov FIPS PUB 197, Advanced Encryption Standard, accessed Nov 2010
-
National Institute of Standards and Technology (NIST), U.S. Department of Commerce. (Nov. 2001). FIPS PUB 197, Advanced Encryption Standard [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, accessed Nov. 2010
-
(2001)
-
-
-
52
-
-
84901189762
-
A survey of SIP authentication and key agreement schemes
-
Second Quarter
-
H. H. Kilinc and T. Yanik"A survey of SIP authentication and key agreement schemes"IEEE Commun. Surv. Tuts., vol. 16, no. 2, pp. 1005-1023, Second Quarter 2014
-
(2014)
IEEE Commun. Surv. Tuts
, vol.16
, Issue.2
, pp. 1005-1023
-
-
Kilinc, H.H.1
Yanik, T.2
|