Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security
The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a ...
Saved in:
| Published in | Turkish journal of computer and mathematics education Vol. 12; no. 6; pp. 2039 - 2044 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
Gurgaon
Ninety Nine Publication
05.04.2021
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1309-4653 1309-4653 |
| DOI | 10.17762/turcomat.v12i6.4807 |
Cover
| Abstract | The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a encryption harder with enhanced public key encryption protocol for the security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows for the suitable security to appear. By means of the firewalls and encryption mechanisms many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web. |
|---|---|
| AbstractList | The businesses generate an "intranet" to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a encryption harder with enhanced public key encryption protocol for the security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows for the suitable security to appear. By means of the firewalls and encryption mechanisms many businesses protected themselves from the internet.The firms crank out an "internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web. The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a encryption harder with enhanced public key encryption protocol for the security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows for the suitable security to appear. By means of the firewalls and encryption mechanisms many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web. |
| Author | Anas Aljarah, Ghaith Alomari |
| Author_xml | – sequence: 1 givenname: Ghaith Alomari surname: Anas Aljarah fullname: Anas Aljarah, Ghaith Alomari |
| BookMark | eNqNkF1LwzAUhoNMcM79Ay8CXnfmo01a72RONxwo6K5LGk9mpEtqmir9985NQbwQr86B8z4vh-cYDZx3gNApJRMqpWDnsQvab1ScvFFmxSTNiTxAQ8pJkaQi44Mf-xEat-0LIYRmMs1zMUT3M2OstuB0j73Bq9a6NY7PgK_s9gDJHOp6oxy-hR5bh6ehb6JfB9U899j4gBcuQnAQ8QPoLtjYn6BDo-oWxl9zhFbXs8fpPFne3Syml8tEU0lkUnHJn6gypAJS6aLIhOQZYWkFKVSGGcoLzrmpRJ4xUAUzPDdCZ7nRKYfMCD5C2b63c43q31Vdl02wGxX6kpJyZ6b8NlPuzJSfZrbc2Z5rgn_toI3li--C275aMsF4wVgu-TaV7lM6-LYNYP5bfvEL0zaqaL2LQdn6b_gDMs2OYg |
| CitedBy_id | crossref_primary_10_1016_j_aej_2024_11_012 |
| ContentType | Journal Article |
| Copyright | 2021. This work is published under https://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2021. This work is published under https://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 0-V 3V. 7XB 88B 88I 8AL 8FE 8FG 8FK ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BGLVJ CCPQU CJNVE DWQXO EDSIH GNUQQ HCIFZ JQ2 K7- M0N M0P M2P P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEDU PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.17762/turcomat.v12i6.4807 |
| DatabaseName | CrossRef ProQuest Social Sciences Premium Collection ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Education Database (Alumni) Science Database (Alumni Edition) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College Education Collection ProQuest Central Korea Turkey Database (ProQuest) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Education Database Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Education ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Education Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea Turkey Database ProQuest Central (New) Advanced Technologies & Aerospace Collection Social Science Premium Collection ProQuest Computing Education Collection ProQuest Science Journals (Alumni Edition) ProQuest Central Basic ProQuest Education Journals ProQuest Science Journals ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Education Journals (Alumni Edition) ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Mathematics |
| EISSN | 1309-4653 |
| EndPage | 2044 |
| ExternalDocumentID | 10.17762/turcomat.v12i6.4807 10_17762_turcomat_v12i6_4807 |
| GroupedDBID | 0-V 5VS 88I 8FE 8FG AAYXX ABDBF ABUWG ACUHS ADBBV AFKRA ALMA_UNASSIGNED_HOLDINGS ALSLI ARALO ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION CJNVE DWQXO EDSIH GNUQQ HCIFZ K6V K7- KQ8 M0P M2P M~E P62 PHGZM PHGZT PIMPY PQEDU PQGLB PQQKQ PROAC PUEGO 3V. 7XB 8AL 8FK EOJEC JQ2 M0N OBODZ PKEHL PQEST PQUKI PRINS Q9U ADTOC IPNFZ RIG UNPAY |
| ID | FETCH-LOGICAL-c1707-b373d1af0be0bc9956735024be4ebf2f139333fb6852ea92f38f6c58fc43e5f63 |
| IEDL.DBID | BENPR |
| ISSN | 1309-4653 |
| IngestDate | Tue Aug 19 19:54:51 EDT 2025 Sat Jul 26 00:22:06 EDT 2025 Thu Apr 24 22:53:51 EDT 2025 Wed Oct 01 04:09:44 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1707-b373d1af0be0bc9956735024be4ebf2f139333fb6852ea92f38f6c58fc43e5f63 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/2623922873?pq-origsite=%requestingapplication%&accountid=15518 |
| PQID | 2623922873 |
| PQPubID | 2045096 |
| PageCount | 6 |
| ParticipantIDs | unpaywall_primary_10_17762_turcomat_v12i6_4807 proquest_journals_2623922873 crossref_primary_10_17762_turcomat_v12i6_4807 crossref_citationtrail_10_17762_turcomat_v12i6_4807 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2021-04-05 |
| PublicationDateYYYYMMDD | 2021-04-05 |
| PublicationDate_xml | – month: 04 year: 2021 text: 2021-04-05 day: 05 |
| PublicationDecade | 2020 |
| PublicationPlace | Gurgaon |
| PublicationPlace_xml | – name: Gurgaon |
| PublicationTitle | Turkish journal of computer and mathematics education |
| PublicationYear | 2021 |
| Publisher | Ninety Nine Publication |
| Publisher_xml | – name: Ninety Nine Publication |
| SSID | ssj0001574886 |
| Score | 2.1423824 |
| Snippet | The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security... The businesses generate an "intranet" to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security... |
| SourceID | unpaywall proquest crossref |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database |
| StartPage | 2039 |
| SubjectTerms | Algorithms Cryptography Firewalls Hardness Integrity Internet Intranets Mathematics Network security Networks Safety Security Stability World Wide Web |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6V7QEuLU9RWpAPXL2b9SvJsepDFYiqEqxUTpHHsaVVV9lVybba_nrGidNSLoC4JnbszNieb6yZbwA-GlEHpzHjqhSWK6cKbrUruHSmLJ1Ebbss_i_n5mymPl3qyy04HnJh6JwlSds-2aAjDIwsEfHxFc4X9GKSJDqpI5n80taTmBQ9UbQYn8C20YTIR7A9O784_N75WrGImtEyZc3ltPcfxriZirkZx_6PrdID1Hy6blZ2c2sXi1-szuku-GG-fbDJ1Xjd4tjd_Ubl-L8_9Bx2Eixlh32jF7Dlm5ewO5R8YOkEeAUXJx3lRMzXZMvAuoADRhiSHce7H8_JitFoDfvsN2zesKPrzapNpNiM4DHrLyB9y76munmvYXZ68u3ojKeiDNxN8yznKHNZT23I0GfoYl5sLjUZevTKYxCBEKWUMqAptPCk6CCLYJwuglPS62DkGxg1y8a_BRa5-wX6IqhSKms01rrADGsMDr32cg_koJTKJcbyWDhjUUXPJaqyGqRbdaqsouT2gN_3WvWMHX9ofzDou0r790clCBWWgrxJmsT4fg381ffe_WuHfXgmYqBMDAfSBzBqr9f-PSGdFj-khfwTk4IFDQ priority: 102 providerName: Unpaywall |
| Title | Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security |
| URI | https://www.proquest.com/docview/2623922873 https://turcomat.org/index.php/turkbilmat/article/download/4807/4040 |
| UnpaywallVersion | publishedVersion |
| Volume | 12 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1309-4653 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001574886 issn: 1309-4653 databaseCode: KQ8 dateStart: 20090101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1309-4653 dateEnd: 20221231 omitProxy: true ssIdentifier: ssj0001574886 issn: 1309-4653 databaseCode: M~E dateStart: 20090101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1309-4653 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001574886 issn: 1309-4653 databaseCode: BENPR dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1309-4653 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001574886 issn: 1309-4653 databaseCode: 8FG dateStart: 20160101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVPQU databaseName: Turkey Database (ProQuest) customDbUrl: eissn: 1309-4653 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001574886 issn: 1309-4653 databaseCode: EDSIH dateStart: 20160101 isFulltext: true titleUrlDefault: https://search.proquest.com/turkey providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgHIADb8R4KQeugS5p0vaAEI-NAWKagElwqpI0kZBGN9gmtH9P0qUbXIBTDm1TyXZs17W_D-CIk8woJgMcJkTgUIUxFkzFmCqeJIpKJoop_vsWb3bC22f2PAetchbGtVWWPrFw1FlPuRr5CbFxOiE2v6dn_XfsWKPc39WSQkN4aoXstIAYm4cF4pCxKrBwUW-1H2ZVFxZZi-V-hi6ynuDEenb7HmHdQY288mM3Yv0zRs0Sz8VR3hfjT9HtfotBjTVY8ckjOp9oex3mdL4BqyUxA_LndAOW76dgrINNaNcLmAg3Y4l6BhVNAsheR1euXqOxjTzdN5GjOz1Grzm6_Bj3hx7IGtmUFk2KhnqIHj3X3RZ0GvWnyyb2RApY1aIgwpJGNKsJE0gdSOVmWSPKbHCWOtTSEGOzQEqpkTxmRFvlGBobrlhsVEg1M5xuQyXv5XoHkMPbJ1LHJkxoKDiTGYtlIDNplNRM0yrQUnSp8ijjjuyim7qvDSfwtBR4Wgg8dQKvAp4-1Z-gbPxx_36pldSfuUE6s5AqHE819a_9dn_fbw-WiGtlcQ07bB8qw4-RPrC5yFAewnzcuD70ZmbX-tXjTdOunVb7_OUL2Q7mPQ |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9tAEB5RONAeWkpbNZTSPcBxwdmX7QNCFIJCIRHiIXFzd9e7ElLqBBKE8uf62zrrrJP20vbC2fbKnpmdmR3PNx_AtmKlt9IkVORMU2FFRrW0GeVW5bnlRuoaxd_rq-6N-HYrb5fgZ4OFCW2VjU-sHXU5tKFGvscwTucM83t-MLqngTUq_F1tKDR0pFYo9-sRYxHYceamT3iEG--fHqO-dxg76VwfdWlkGaC2nSYpNTzlZVv7xLjE2AD0TLnEyGWccMYzjykS59wblUnm8M09z7yyMvNWcCe94rjuC1gRXOR4-Fv52ulfXC6qPDLFHaIiZi9Fz7OHkQS_S6P7abM7tRsg3X_GxEWiu_pYjfT0SQ8Gv8W8kzV4HZNVcjizrrew5Kp1eNMQQZDoF9bhVW8-_HX8Di469ViKgOkkQ0_qpgSC18lxqA85ipFu8ENXBOVG7ipy9DAdTeLgbIIpNJkVKd2EXEVuvfdw8ywi_QDL1bByH4GE-f7MuMyLnAutpCllZhJTGm-Nk463gDeiK2ycah7INQZFON0EgReNwIta4EUQeAvo_KnRbKrHP-7fbLRSxD0-LhYW2YLduab-a72Nv6_3BVa7173z4vy0f_YJXrLQRhOaheQmLE8eHt1nzIMmZisaG4Hvz23fvwCiyB7Y |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6V7QEuLU9RWpAPXL2b9SvJsepDFYiqEqxUTpHHsaVVV9lVybba_nrGidNSLoC4JnbszNieb6yZbwA-GlEHpzHjqhSWK6cKbrUruHSmLJ1Ebbss_i_n5mymPl3qyy04HnJh6JwlSds-2aAjDIwsEfHxFc4X9GKSJDqpI5n80taTmBQ9UbQYn8C20YTIR7A9O784_N75WrGImtEyZc3ltPcfxriZirkZx_6PrdID1Hy6blZ2c2sXi1-szuku-GG-fbDJ1Xjd4tjd_Ubl-L8_9Bx2Eixlh32jF7Dlm5ewO5R8YOkEeAUXJx3lRMzXZMvAuoADRhiSHce7H8_JitFoDfvsN2zesKPrzapNpNiM4DHrLyB9y76munmvYXZ68u3ojKeiDNxN8yznKHNZT23I0GfoYl5sLjUZevTKYxCBEKWUMqAptPCk6CCLYJwuglPS62DkGxg1y8a_BRa5-wX6IqhSKms01rrADGsMDr32cg_koJTKJcbyWDhjUUXPJaqyGqRbdaqsouT2gN_3WvWMHX9ofzDou0r790clCBWWgrxJmsT4fg381ffe_WuHfXgmYqBMDAfSBzBqr9f-PSGdFj-khfwTk4IFDQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficiency+of+Using+the+Diffie-Hellman+Key+in+Cryptography+for+Internet+Security&rft.jtitle=Turkish+journal+of+computer+and+mathematics+education&rft.au=Alomari%2C+Ghaith&rft.au=Aljarah%2C+Anas&rft.date=2021-04-05&rft.pub=Ninety+Nine+Publication&rft.eissn=1309-4653&rft.volume=12&rft.issue=6&rft.spage=2039&rft.epage=2044&rft_id=info:doi/10.17762%2Fturcomat.v12i6.4807 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1309-4653&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1309-4653&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1309-4653&client=summon |