top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices [[electronic resource] ] : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / / edited by Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices [[electronic resource] ] : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / / edited by Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (IX, 258 p.)
Disciplina 332.1/78
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Special purpose computers
Computer programming
Programming languages (Electronic computers)
Operating systems (Computers)
Cryptology
Software Engineering
Special Purpose and Application-Based Systems
Programming Techniques
Programming Languages, Compilers, Interpreters
Operating Systems
ISBN 3-540-30569-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation in Java Card -- Verification of Safety Properties in the Presence of Transactions -- Modelling Mobility Aspects of Security Policies -- Smart Devices for Next Generation Mobile Services -- A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checking -- Combining Several Paradigms for Circuit Validation and Verification -- Smart Card Research Perspectives.
Record Nr. UNISA-996466053503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 530 p. 248 illus., 91 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computers
Law and legislation
Software engineering
Application software
Artificial intelligence
Systems and Data Security
Computer Communication Networks
Legal Aspects of Computing
Software Engineering
Information Systems Applications (incl. Internet)
Artificial Intelligence
ISBN 3-030-12942-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Ultralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based Encryption Scheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme.
Record Nr. UNISA-996466342903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
Innovative Security Solutions for Information Technology and Communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 530 p. 248 illus., 91 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer networks
Computers
Law and legislation
Software engineering
Application software
Artificial intelligence
Systems and Data Security
Computer Communication Networks
Legal Aspects of Computing
Software Engineering
Information Systems Applications (incl. Internet)
Artificial Intelligence
ISBN 3-030-12942-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Ultralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based Encryption Scheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme.
Record Nr. UNINA-9910337565503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems [[electronic resource] ] : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
Risks and Security of Internet and Systems [[electronic resource] ] : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 269 p. 72 illus.)
Disciplina 004.67
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Data encryption (Computer science)
Application software
Computers
Artificial intelligence
Special purpose computers
Software Engineering/Programming and Operating Systems
Cryptology
Information Systems Applications (incl. Internet)
Computing Milieux
Artificial Intelligence
Special Purpose and Application-Based Systems
ISBN 3-319-76687-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability analysis and classification -- Apps security -- Access control and filtering -- Cloud security -- Cyber-insurance and cyber threat intelligence -- Human-centric security and trust -- Risk analysis.
Record Nr. UNISA-996465510203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
Risks and Security of Internet and Systems : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 269 p. 72 illus.)
Disciplina 004.67
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Data encryption (Computer science)
Application software
Computers
Artificial intelligence
Computers, Special purpose
Software Engineering/Programming and Operating Systems
Cryptology
Information Systems Applications (incl. Internet)
Computing Milieux
Artificial Intelligence
Special Purpose and Application-Based Systems
ISBN 9783319766874
3319766872
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability analysis and classification -- Apps security -- Access control and filtering -- Cloud security -- Cyber-insurance and cyber threat intelligence -- Human-centric security and trust -- Risk analysis.
Record Nr. UNINA-9910349426103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems [[electronic resource] ] : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
Risks and Security of Internet and Systems [[electronic resource] ] : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VIII, 239 p. 67 illus.)
Disciplina 004.67
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data protection
Software engineering
Data encryption (Computer science)
Computer organization
Computers
Application software
Security
Software Engineering/Programming and Operating Systems
Cryptology
Computer Systems Organization and Communication Networks
Theory of Computation
Information Systems Applications (incl. Internet)
ISBN 3-319-54876-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice.
Record Nr. UNISA-996466334003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
Risks and Security of Internet and Systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VIII, 239 p. 67 illus.)
Disciplina 004.67
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data protection
Software engineering
Data encryption (Computer science)
Computer organization
Computers
Application software
Security
Software Engineering/Programming and Operating Systems
Cryptology
Computer Systems Organization and Communication Networks
Theory of Computation
Information Systems Applications (incl. Internet)
ISBN 3-319-54876-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice.
Record Nr. UNINA-9910484507603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (X, 239 p. 78 illus.)
Disciplina 004.6
Altri autori (Persone) GollmannDieter
LanetJean-Louis
Iguchi-CartignyJulien
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Smart cards
ISBN 1-280-38627-4
9786613564191
3-642-12510-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
Record Nr. UNINA-9910483369703321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Smart Card Research and Advanced Applications [[electronic resource] ] : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 239 p. 78 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
User interfaces (Computer systems)
Computers and civilization
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computer Communication Networks
User Interfaces and Human Computer Interaction
Computers and Society
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 1-280-38627-4
9786613564191
3-642-12510-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
Record Nr. UNISA-996465620503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui

Opere

Altro...

Lingua di pubblicazione

Altro...

Data

Data di pubblicazione

Altro...