Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isw/isc2016.bht:"
@inproceedings{DBLP:conf/isw/0001TY16, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {18--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_2}, doi = {10.1007/978-3-319-45871-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/0001TY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AshurM16, author = {Tomer Ashur and Bart Mennink}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Damaging, Simplifying, and Salvaging p-OMD}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {73--92}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_6}, doi = {10.1007/978-3-319-45871-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AshurM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BagS16, author = {Samiran Bag and Kouichi Sakurai}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {167--180}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_11}, doi = {10.1007/978-3-319-45871-7\_11}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BagS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BansarkhaniMP16, author = {Rachid El Bansarkhani and Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {{MQSAS} - {A} Multivariate Sequential Aggregate Signature Scheme}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {426--439}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_25}, doi = {10.1007/978-3-319-45871-7\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BansarkhaniMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BiswasSK16, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Uni-ARBAC: {A} Unified Administrative Model for Role-Based Access Control}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {218--230}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_14}, doi = {10.1007/978-3-319-45871-7\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BiswasSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/EppsteinGLMMT16, author = {David Eppstein and Michael T. Goodrich and Jenny Lam and Nil Mamano and Michael Mitzenmacher and Manuel R. Torres}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Models and Algorithms for Graph Watermarking}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {283--301}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_18}, doi = {10.1007/978-3-319-45871-7\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/EppsteinGLMMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FukumitsuH16, author = {Masayuki Fukumitsu and Shingo Hasegawa}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {389--407}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_23}, doi = {10.1007/978-3-319-45871-7\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/FukumitsuH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HanzlikK16, author = {Lucjan Hanzlik and Miroslaw Kutylowski}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Chip Authentication for E-Passports: {PACE} with Chip Authentication Mapping v2}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {115--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_8}, doi = {10.1007/978-3-319-45871-7\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HanzlikK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {95--114}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_7}, doi = {10.1007/978-3-319-45871-7\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM16a, author = {Franziskus Kiefer and Mark Manulis}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Universally Composable Two-Server {PAKE}}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {147--166}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_10}, doi = {10.1007/978-3-319-45871-7\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/KieferM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LinTGF16, author = {Yan Lin and Xiaoxiao Tang and Debin Gao and Jianming Fu}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Control Flow Integrity Enforcement with Dynamic Code Optimization}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {366--385}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_22}, doi = {10.1007/978-3-319-45871-7\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LinTGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OuWSZAP16, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou and Juan Ai and Na Pang}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Enhanced Correlation Power Analysis by Biasing Power Traces}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {59--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_5}, doi = {10.1007/978-3-319-45871-7\_5}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/OuWSZAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Partial Key Exposure Attacks on {CRT-RSA:} General Improvement for the Exposed Least Significant Bits}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {35--47}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_3}, doi = {10.1007/978-3-319-45871-7\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Tolba0Y16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_1}, doi = {10.1007/978-3-319-45871-7\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TomidaAO16, author = {Junichi Tomida and Masayuki Abe and Tatsuaki Okamoto}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {408--425}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_24}, doi = {10.1007/978-3-319-45871-7\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/TomidaAO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WagnerE16, author = {Steffen Wagner and Claudia Eckert}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {305--322}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_19}, doi = {10.1007/978-3-319-45871-7\_19}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/WagnerE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangW16, author = {Li Wang and Dinghao Wu}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Moving Target Defense Against Network Reconnaissance with Software Defined Networking}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {203--217}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_13}, doi = {10.1007/978-3-319-45871-7\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangenSH16, author = {Gaute Wangen and Andrii Shalaginov and Christoffer Hallstensen}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cyber Security Risk Assessment of a DDoS Attack}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {183--202}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_12}, doi = {10.1007/978-3-319-45871-7\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangenSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WasedaN16, author = {Atsushi Waseda and Ryo Nojima}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Analyzing Randomized Response Mechanisms Under Differential Privacy}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {271--282}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_17}, doi = {10.1007/978-3-319-45871-7\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WasedaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WebsterHLLZE16, author = {George D. Webster and Zachary D. Hanif and Andre L. P. Ludwig and Tamas K. Lengyel and Apostolis Zarras and Claudia Eckert}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {{SKALD:} {A} Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {231--249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_15}, doi = {10.1007/978-3-319-45871-7\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WebsterHLLZE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHSZHP16, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {440--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_26}, doi = {10.1007/978-3-319-45871-7\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/XuHSZHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHZPH16, author = {Jun Xu and Lei Hu and Xiaona Zhang and Liqiang Peng and Zhangjie Huang}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {48--58}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_4}, doi = {10.1007/978-3-319-45871-7\_4}, timestamp = {Sun, 13 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/XuHZPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuMW16, author = {Dongpeng Xu and Jiang Ming and Dinghao Wu}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Generalized Dynamic Opaque Predicates: {A} New Control Flow Obfuscation Method}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {323--342}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_20}, doi = {10.1007/978-3-319-45871-7\_20}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/XuMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YanKSL16, author = {Guanhua Yan and Yunus Kucuk and Max Slocum and David C. Last}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {343--365}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_21}, doi = {10.1007/978-3-319-45871-7\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YanKSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangYZQF16, author = {Bo Yang and Kang Yang and Zhenfeng Zhang and Yu Qin and Dengguo Feng}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {{AEP-M:} Practical Anonymous E-Payment for Mobile Devices Using {ARM} TrustZone and Divisible E-Cash}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {130--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_9}, doi = {10.1007/978-3-319-45871-7\_9}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YangYZQF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Zarras16, author = {Apostolis Zarras}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Leveraging Internet Services to Evade Censorship}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {253--270}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_16}, doi = {10.1007/978-3-319-45871-7\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Zarras16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2016, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7}, doi = {10.1007/978-3-319-45871-7}, isbn = {978-3-319-45870-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.