Publications from 2009

Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan. Low Area Implementation of the Hash Function “Blue Midnight Wish – 256” for FPGA platforms. I: Proceedings of The International Conference on Intelligent Networking and Collaborative Systems. IEEE Computer Society 2009 ISBN 978-0-7695-3858-7. s. 100-104
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan; Aas, Einar Johan. Low Area FPGA and ASIC Implementations of the Hash Function “Blue Midnight Wish-256. I: Proceedings, ICCES’09, The 2009 International Conference on Computer Engineering & Systems. IEEE conference proceedings 2009 ISBN 978-1-4244-5843-1. s. 10-14
Azfar, Abdullah; Hossen, Md. Sakhawat; Khan, Razib Hayat. SIP Mobility Modes: Application Layer and Data Link Layer. International Journal of Computer Science and Network Security 2009 ;Volum 9.(12) s. 258-264
Bang, Nicolay; Jørstad, Ivar; Jønvik, Tore Erling; Boning, Feng; Do, Van Thanh; Engelstad, Paal E.; Do, Van Thuan. A business model for a telecom 2.0 start-up. I: Proceedings of the 11th International Conference on Intelligence in Next Generation Networks (ICIN 2009). IEEE Press 2009 ISBN 978-1-4244-4694-0.
Based, Md Abdul; Mjølsnes, Stig Frode. A Non-Interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 148-160
Based, Md Abdul; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. Internet Voting using Multiparty Computations. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 136-147
Blakstad, Jørgen Wahl; Nergård, Rune Walsø; Jaatun, Martin Gilje; Gligoroski, Danilo. All in a day's work: Password cracking for the rest of us. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 69-83
Bræk, Rolv; Rossebø, Judith Ellen Yarranton. Methodology for Policy-Enabled Dynamic composition of services. Trondheim: Department of Telematics, NTNU 2009 56 s.
Cho, Jeong-woo; Jiang, Yuming. Basic Theorems on the Backoff Process in 802.11. SIGMETRICS Performance Evaluation Review 2009 ;Volum 37.(2) s. 18-20
Csorba, Mate Jozsef. Foraging for Better Deployment of Replicated Service Components. 9th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS'09); 2009-06-09 - 2009-06-12
Csorba, Mate Jozsef. Laying pheromone trails for balanced and dependable component mappings. IFIP 4th International Workshop on Self-Organizing Systems; 2009-12-09 - 2009-12-11
Csorba, Mate Jozsef. “The SIP Pod” a VoIP student lab/playing field. 4th International Workshop on Distributed Cooperative Laboratories: Instrumenting the Grid (INGRID'09); 2009-04-01 - 2009-04-03
Csorba, Mate Jozsef; Heegaard, Poul Einar; Meling, Hein. Laying pheromone trails for balanced and dependable component mappings. Lecture Notes in Computer Science 2009 (5918) s. 50-64
Csorba, Mate Jozsef; Meling, Hein; Heegaard, Poul Einar; Herrmann, Peter. Foraging for Better Deployment of Replicated Service Components. Lecture Notes in Computer Science 2009 ;Volum 5523. s. 87-101
Do, Van Thanh. Identity Management on the Internet: Opportunities and challenges for Mobile operators. The 14th Nordic Conference on Secure IT Systems; 2009-10-14 - 2009-10-16
Do, Van Thanh. The evolution of the telecommunication system from vertical to a horizontal architecture. Telektronikk 2009 (2)
Do, Van Thanh; Engelstad, Paal E.; Do, Van Thuan; Jørstad, Ivar; Jønvik, Tore Erling. Personalised IMS client widget. I: Proceedings of the 11th International Conference on Intelligence in Next Generation Networks (ICIN 2009). IEEE Press 2009 ISBN 978-1-4244-4694-0.
Do, Van Thanh; Jønvik, Tore Erling; Do, Van Thuan; Jørstad, Ivar. Dynamic user-centric IMS client using Widgets. Verdikt Conference 2009; 2009-11-03 - 2009-11-04
Do, Van Thanh; Jørstad, Ivar; johansen, tor anders; Bakken, Elias; Jønvik, Tore Erling. Pervasive Service Access with SIM-based VPN. I: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. IEEE Computer Society 2009 ISBN 978-1-4244-5113-5.
Do, Van Thanh; Jørstad, Ivar; Jønvik, Tore Erling; Do, Van Thuan. Strong authentication with mobile phone as security token. I: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. IEEE Computer Society 2009 ISBN 978-1-4244-5113-5.
Do, Van Thuan; Engelstad, Paal E.; Boning, Feng; Jørstad, Ivar; Do, Van Thanh; Bang, Nicolay. IPTV revisited. I: Proceedings of the 11th International Conference on Intelligence in Next Generation Networks (ICIN 2009). IEEE Press 2009 ISBN 978-1-4244-4694-0.
Do, Van Thuan; Jønvik, Tore Erling; Jørstad, Ivar; Boning, Feng; Do, Van Thanh. Strong authentication using dual SIM. I: Proceedings of the 11th International Conference on Intelligence in Next Generation Networks (ICIN 2009). IEEE Press 2009 ISBN 978-1-4244-4694-0.
Eian, Martin. Fragility of the Robust Security Network: 802.11 Denial of Service. I: Proceedings of the 7th International Conference on Applied Cryptography and Network Security. Springer 2009 ISBN 978-3-642-01956-2. s. 400-416
Floch, Jacqueline; Sanders, Richard; Bræk, Rolv. Compositional Service Engineering Using Semantic Interfaces. I: At Your Service. Service oriented computing from an EU perspective. MIT Press 2009 ISBN 978-0-262-04253-6. s. 101-128
Gao, Yuehong; Zhang, X; Yang, DC; Jiang, Yuming. Unified Simulation Evaluation for Mobile Broadband Technologies. IEEE Communications Magazine 2009 ;Volum 47.(3) s. 142-149
Giambene, Giovanni; Jiang, Yuming; Yeo, Boon Sain; Shorey, Rajeev. Proceedings of 2009 6th International Symposium on Wireless Communication Systems. IEEE conference proceedings 2009 (ISBN 978-1-4244-3584-5) 704 s.
Gligoroski, Danilo. On a Family of Minimal Candidate One-way Functions and One-way Permutations. International Journal of Network Security 2009 ;Volum 8.(3) s. 211-220
Gligoroski, Danilo. Swiss army knife in cryptography and information security - cryptographic hash functions. MASSEE International Congress on Mathematics - MICOM 2009; 2009-09-16 - 2009-09-20
Gligoroski, Danilo; Klima, Vlastimil. On the Computational Asymmetry of the S-Boxes Present in Blue Midnight Wish Cryptographic Hash Function. I: ICT Innovations 2009. Springer 2009 ISBN 978-3-642-10780-1.
Gunawan, Linda Ariani; Herrmann, Peter Michael; Kraemer, Frank Alexander. Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. Communications in Computer and Information Science 2009 ;Volum 58. s. 72-85
Gundersen, Henrik; Lello, Paul Martin; Lindbach, Arnhild K; Skjerdal, Åsmund; Kristiansen, Lill. Forstyrrelser ved bruk av trådløs telefon på sykehus: forslag til forbedring. I: Proceedings fra NOKOBIT 2009 - Norsk konferanse for organisasjoners bruk av informasjonsvitenskap. Tapir Akademisk Forlag 2009 ISBN 9788251924931. s. 121-134
Heegaard, Poul Einar; Sandmann, Werner. Importance Sampling Simulations of Phase-Type Queues. Winter simulation conference : proceedings 2009 s. 1136-1145
Heegaard, Poul Einar; Trivedi, Kishor. Network survivability modeling. Computer Networks 2009 ;Volum 53.(8) s. 1215-1234
Heegaard, Poul Einar; Trivedi, Kishor. Survivability Modeling with Stochastic Reward Nets. Winter simulation conference : proceedings 2009 s. 807-818
Holth, Karsten Peder; Do, Van Thuan; Jørstad, Ivar; Do, Van Thanh. An analysis of Widget security. I: Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings. Springer Publishing Company 2009 ISBN 978-3-642-04765-7.
Holthe, Ole-Ivar; Mogstad, Ola; Rønningen, Leif Arne. Geelix LiveGames: Remote Playing of Video Games. I: Consumer Communications and Networking Conference. CCNC2009. 6th IEEE. IEEE conference proceedings 2009 ISBN 978-1-4244-2308-8.
Jaatun, Martin Gilje; Jensen, Jostein; Vegge, Håvard; Halvorsen, Finn Michael; Nergård, Rune Walsø. Fools Download Where Angels Fear to Tread. IEEE Security and Privacy 2009 ;Volum 7.(2) s. 83-86
Jiang, Yuming. Network Calculus and Queueing Theory: Two Sides of One Coin. I: Proceedings of Fourth International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS 2009). Association for Computing Machinery (ACM) 2009 ISBN 978-963-9799-70-7.
Jiang, Yuming. Stochastic Network Calculus. Telecommunication and Networking Program, University of Pittsburgh; 2009-10-02 - 2009-10-02
Jiang, Yuming; Yin, Qinghe; Liu, Yong; Jiang, Shengming. Fundamental calculus on generalized stochastically bounded bursty traffic for communication networks. Computer Networks 2009 ;Volum 53.(12) s. 2011-2021
Jørstad, Ivar; Bakken, Elias; Eliasson, Charlott; Fielder, Markus; Do, Van Thanh. Releasing the potential of OpenID and SIM. I: Proceedings of the 11th International Conference on Intelligence in Next Generation Networks (ICIN 2009). IEEE Press 2009 ISBN 978-1-4244-4694-0.
Kamal Bashah, Nor Shaniza; Jørstad, Ivar; Do, Van Thanh. Service Naming in Future Mobile Environments. I: Proceedings from the 38th International Conference on Parallel Processing (ICPP2009). IEEE conference proceedings 2009 ISBN 978-0-7695-3803-7. s. 256-261
Kamal Bashah, Nor Shaniza; Jørstad, Ivar; Do, Van Thanh. Enabling Service Continuity on Future Mobile Services. I: 4th International Symposium on Wireless Pervasive Computing, 2009. ISWPC 2009.. IEEE conference proceedings 2009 ISBN 978-1-4244-2966-0.
Kathayat, Surya Bahadur; Bræk, Rolv. Platform Support for Situated Collaborative Learning. I: International Conference on Mobile, Hybrid, and On-line Learning, 2009. ELML '09.. IEEE Computer Society 2009 ISBN 978-1-4244-3361-2. s. 53-60
Khan, Muhammad Qasim; Andresen, Steinar Hidle. APPLICATION OF MEDIA INDEPENDENT HANDOVER (MIH) FOR INTRA TECHNOLOGY HANDOVER. I: Proceedings of The Third Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009) 21-23 December 2009 Amman - Jordan. Amman Jordan: MOSHARAKA FOR RESEARCHES AND STUDIES 2009 ISBN 978-9957-486-09-9.
Khan, Razib Hayat; Heegaard, Poul Einar. Translation from UML to Markov Model: A performance modeling framework. Int. Joint Conference on Computer, Information, and Systems Sciences, and Engineering (CISSE 2009); 2009-12-04 - 2009-12-12
Kimsas, Andreas; Øverby, Harald; Stol, Norvald. Analysis of a bufferless OpMiGua Node. I: Proceedings of the 5th advanced international conference on telecommunications. IEEE Computer Society 2009 ISBN 978-0-7695-3611-8. s. 381-388
Klima, Vlastimil; Gligoroski, Danilo. On Blue Midnight Wish Decomposition. I: Proceedings of Santa's Crypto Get-Together (SantaCrypt) 2009 workshop. Prague: Trusted Network Solutions, a.s. 2009 ISBN 978-80-904257-0-5. s. 41-51
Kortvedt, Henning Siitonen; Mjølsnes, Stig Frode. Eavesdropping Near Field Communication. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 57-68
Kraemer, Frank Alexander. Automatic Generation of Compatible Interfaces from Partitioned UML Activities. SDL Forum 2009; 2009-09-22 - 2009-09-24
Kraemer, Frank Alexander; Bræk, Rolv; Herrmann, Peter. Compositional Service Engineering with Arctis. Telektronikk 2009 ;Volum 105.(1.2009) s. 135-151
Kraemer, Frank Alexander; Herrmann, Peter Michael. Automated Encapsulation of UML Activities for Incremental Development and Verification. Int. Conference on Model Driven Engineering, Languages and Systems (Models); 2009-10-04 - 2009-10-09
Kraemer, Frank Alexander; Kathayat, Surya Bahadur; Bræk, Rolv. Unified Modeling of Service Logic with User Interfaces. I: Proceeding of the first international workshop on Model driven service engineering and data quality and security 2009. Association for Computing Machinery (ACM) 2009 ISBN 978-1-60558-816-2. s. 37-44
Kraemer, Frank Alexander; Samset, Haldor; Bræk, Rolv. An Automated Method for Web Service Orchestration Based on Reusable Building Blocks. I: Web Services, 2009. ICWS 2009. IEEE International Conference on. IEEE Computer Society 2009 ISBN 978-0-7695-3709-2. s. 262-270
Kraemer, Frank Alexander; Slåtten, Vidar; Herrmann, Peter Michael. Model-Driven Construction of Embedded Applications
 based on Reusable Building Blocks - An Example. SDL Forum 2009; 2009-09-22 - 2009-09-24
Kraemer, Frank Alexander; Slåtten, Vidar; Herrmann, Peter Michael. Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software 2009 ;Volum 82.(12) s. 2068-2080
Kristiansen, Lill; Lello, paul martin. Interrupts caused by use of wireless phones in hospitals: proposal for improvement. NoKoBit 2009; 2009-11-23 - 2009-11-25
Kristiansen, Lill; Østhus, Egil Conradi. A personal communication service in a pervasive office environment using SIP B2BUA on the endpoint. I: Intelligence in Next Generation Networks, 2009. ICIN 2009. 13th International Conference on. IEEE conference proceedings 2009 ISBN 9781424446940.
Landmark, Lars. Routing over Heterogeneous Radio Networks in Mobile Ad Hoc Networks. : NTNU 2009 (ISBN 978-82-471-1699-9) 144 s. Doktoravhandlinger ved NTNU(2009:154)
Larsen, Erlend; Landmark, Lars; Pham, Vinh Quang; Engelstad, Paal Einar; Kure, Øivind. Preemption Mechanisms for Push-to-Talk in Ad Hoc Networks. The 34th IEEE Conference on Local Computer Networks 2009 (LCN2009); 2009-10-20 - 2009-10-23
Larsen, Erlend; Landmark, Lars; Pham, Vinh Quang; Kure, Øivind; Engelstad, Paal Einar. Routing with Transmission Buffer Zones in MANETs. IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM '09); 2009-06-15 - 2009-06-18
Lin, Chih-Kuang; Kure, Øivind. A Game Theoretic Framework for Decentralized and Distributed Energy Utilization in Wireless Sensor Networks. The ISCA International Conference on Sensor Networks and Applications (SNA), 2009; 2009-11-04 - 2009-11-06
Lin, Chih-Kuang; Kure, Øivind. Energy-aware Path Selection in Mobile Wireless Sensor Networks: A Dynamic Bayesian Game Approach. I: Proceedings of IEEE PIMRC 2009. IEEE Communications Society 2009 ISBN 978-1-4244-5123-4. s. 100-105
Maartmann-Moe, Carsten; Thorkildsen, Steffen E.; Årnes, Andre. The persistence of memory: Forensic identification and extraction of cryptographic keys. Digital Investigation. The International Journal of Digital Forensics and Incident Response 2009 ;Volum 6. Suppl. 1 s. S132-S140
Mauland, Atle; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. Realizing Distributed RSA Key Generation Using VIFF. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 122-135
Mjaaland, Bendik Bjørklid; Bours, Patrick; Gligoroski, Danilo. Gait Mimicking - Attack Resistance Testing of Gait Authentication Systems. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 13-26
Mjaaland, Bendik Bjørklid; Gligoroski, Danilo; Knapskog, Svein Johan. Biocryptics: Towards Robust Biometric Public/Private Kay Generation. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 27-42
Mjaaland, Bendik Bjørklid; Gligoroski, Danilo; Knapskog, Svein Johan. The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. I: IEEE Proceedings of 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society 2009 ISBN 978-0-7695-3762-7. s. 1066-1071
Mjølsnes, Stig Frode. Cryptographic Protocols. NISNET Finse PhD Winter School; 2009-05-03 - 2009-05-08
Mjølsnes, Stig Frode. Flere parter, Internett og kryptoprotokoller. NISNET næringslivsseminar 2009; 2009-11-23 - 2009-11-23
Mjølsnes, Stig Frode. Multiparts privat RSA-nøkkel. Norsk Kryptoseminar 2009; 2009-10-22 - 2009-10-23
Mjølsnes, Stig Frode. NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 (ISBN 978-82-519-2492-4) 206 s.
Moe, Marie Elisabeth Gaup. Security, Privacy and Trust in Dynamic Networks. Trondheim: NTNU 2009 (ISBN 978-82-471-1577-0) 151 s. Doktoravhandlinger ved NTNU(2009:98)
Moseng, Tor Kjetil. A QoS Architecture for Mobile Ad Hoc Networks. Trondheim: NTNU 2009 (ISBN 978824711604-3) 126 s. Doktoravhandlinger ved NTNU(2009:111)
Ofigsbø, Mona Holsve; Mjølsnes, Stig Frode; Heegaard, Poul Einar; Nilsen, Leif. Reducing the Cost of Certificate Revocation: A Case Study. EUROPKI'09 - Sixth European Workshop on Public Key Services, Applications and Infrastructures; 2009-09-10 - 2009-09-11
Panggabean, Mauritz; de Waele, Stijn; de Haan, Gerard; Rønningen, Leif Arne. Automatic Texture-Detection Algorithm For Texture Synthesis In Video Compression. IASTED International Conference on Signal and Image Processing (SIP) 2009; 2009-08-17 - 2009-08-19
Panggabean, Mauritz; Rønningen, Leif Arne. Character recognition of the Batak Toba alphabet using signatures and simplified chain codes. IEEE International Conference on Signal and Image Processing Applications (ICSIPA) 2009; 2009-11-17 - 2009-11-19
Pham, Vinh Quang; Larsen, Erlend; Kure, Øivind; Engelstad, Paal. Routing of internal MANET traffic over external networks. International Journal of Mobile Information Systems 2009 ;Volum 5.(3) s. 291-311
Reistad, Tord Ingolf. Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. Secrypt; 2009-07-07 - 2009-07-10
Rossebø, Judith Ellen Yarranton. Dynamic Composition of Services - a Model-Based Approach. : NTNU 2009 (ISBN 978-82-471-1719-4) 346 s. Doktoravhandlinger ved NTNU(2009:163)
Rønningen, Leif Arne; Heiberg, Erlend. Perception of time variable quality of scene objects. I: Image Quality and System Performance VI (Proceedings Volume). SPIE - International Society for Optical Engineering 2009 ISBN 9780819474926.
Stolbunov, Anton. Reductionist Security Arguments for Public-Key Cryptographic Schemes Based on Group Action. I: NISK 2009: Proceedings of the 2nd Norwegian Security Conference. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2492-4. s. 97-109
Tavakolifard, Mozhgan; Herrmann, Peter; Øzturk, Pinar. Analogical Trust Reasoning. IFIP Advances in Information and Communication Technology 2009 s. 149-163
Tavakolifard, Mozhgan; Knapskog, Svein Johan; Herrmann, Peter. Inferring Trust Based on Similarity with TILLIT. IFIP Advances in Information and Communication Technology 2009 s. 133-148
Tuft, Vegard Larsen; Bjørnstad, Steinar; Hjelme, Dag Roar. Effect of traffic patterns on automatic polarization control with polarization and time-division multiplexed optical packet transmission. Journal of Optical Networking 2009 ;Volum 8.(5) s. 393-403
Undheim, Astrid. Characterization and Modeling of Slice-based Video Traffic. Trondheim: NTNU 2009 (ISBN 978-82-471-1564-0) 177 s. Doktoravhandlinger ved NTNU(2009:92)
Velinov, G.; Kon-Popovska, M.; Gligoroski, Danilo. A Generalized Approach to Optimization of Relational Data Warehouses Using Hybrid Greedy and Genetic Algorithms. Scientific Annals of Computer Science 2009 ;Volum 19. s. 25-55
Xie, Jing; Jiang, Yuming. Stochastic Network Calculus Models under Max-Plus Algebra. I: Proceedings of IEEE Global Telecommunications Conference 2009. IEEE conference proceedings 2009 ISBN 978-1-4244-4148-8.
Ødegård, Rune Steinsmo; Gligoroski, Danilo. On the Randomness and Regularity of Reduced Edon-R Compression Function. I: Proceedings of the 2009 International Conference on Security & Managment. USA: CSREA press 2009 ISBN 1-60132-124-4. s. 521-525
Østhus, Egil Conradi; Osland, Per-Oddvar; Kristiansen, Lill. ENME: An ENriched MEdia Application Utilizing Context for Session Mobility in a Telecom System. International Journal of Pervasive Computing and Communications 2009 ;Volum 5.(2) s. 127-162
Østhus, Ivar Conradi; Hansen, Lars-Petter Gunhildsberg; Heegaard, Poul Einar. Online Broadband Test Tools. I: Norsk Informatikk Konferanse 2009. Tapir Akademisk Forlag 2009 ISBN 978-82-519-2491-7. s. 61-72
Øverby, Harald. Analysis of a bufferless OpMiGua Node. 5th Advanced International Conference on Telecommunications; 2009-05-24 - 2009-05-28
Øverby, Harald. Packet Loss Differentiation using Network Layer Packet Redundancy in Optical Packet/Burst Switched Networks. Proceedings of IEEE Globecom conference 2009
Øverby, Harald. Reduced load Engset fix point analysis for optical burst switched networks. I: Proceedings of the international conference on photonics and switching 2009. : IEEE Photonics society 2009 ISBN 978-1-4244-3856-3.