Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security

The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a ...

Full description

Saved in:
Bibliographic Details
Published inTurkish journal of computer and mathematics education Vol. 12; no. 6; pp. 2039 - 2044
Main Author Anas Aljarah, Ghaith Alomari
Format Journal Article
LanguageEnglish
Published Gurgaon Ninety Nine Publication 05.04.2021
Subjects
Online AccessGet full text
ISSN1309-4653
1309-4653
DOI10.17762/turcomat.v12i6.4807

Cover

Abstract The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a  encryption harder with enhanced public key encryption protocol for the  security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations,  and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The  internet structure itself allowed for many security threats  to  occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows  for  the suitable security to  appear. By means of the firewalls and encryption   mechanisms  many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.
AbstractList The businesses generate an "intranet" to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a encryption harder with enhanced public key encryption protocol for the security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows for the suitable security to appear. By means of the firewalls and encryption mechanisms many businesses protected themselves from the internet.The firms crank out an "internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.
The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a  encryption harder with enhanced public key encryption protocol for the  security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations,  and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The  internet structure itself allowed for many security threats  to  occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows  for  the suitable security to  appear. By means of the firewalls and encryption   mechanisms  many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.
Author Anas Aljarah, Ghaith Alomari
Author_xml – sequence: 1
  givenname: Ghaith Alomari
  surname: Anas Aljarah
  fullname: Anas Aljarah, Ghaith Alomari
BookMark eNqNkF1LwzAUhoNMcM79Ay8CXnfmo01a72RONxwo6K5LGk9mpEtqmir9985NQbwQr86B8z4vh-cYDZx3gNApJRMqpWDnsQvab1ScvFFmxSTNiTxAQ8pJkaQi44Mf-xEat-0LIYRmMs1zMUT3M2OstuB0j73Bq9a6NY7PgK_s9gDJHOp6oxy-hR5bh6ehb6JfB9U899j4gBcuQnAQ8QPoLtjYn6BDo-oWxl9zhFbXs8fpPFne3Syml8tEU0lkUnHJn6gypAJS6aLIhOQZYWkFKVSGGcoLzrmpRJ4xUAUzPDdCZ7nRKYfMCD5C2b63c43q31Vdl02wGxX6kpJyZ6b8NlPuzJSfZrbc2Z5rgn_toI3li--C275aMsF4wVgu-TaV7lM6-LYNYP5bfvEL0zaqaL2LQdn6b_gDMs2OYg
CitedBy_id crossref_primary_10_1016_j_aej_2024_11_012
ContentType Journal Article
Copyright 2021. This work is published under https://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2021. This work is published under https://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
0-V
3V.
7XB
88B
88I
8AL
8FE
8FG
8FK
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CJNVE
DWQXO
EDSIH
GNUQQ
HCIFZ
JQ2
K7-
M0N
M0P
M2P
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEDU
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOI 10.17762/turcomat.v12i6.4807
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Education Database (Alumni)
Science Database (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
Education Collection
ProQuest Central Korea
Turkey Database (ProQuest)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Computing Database
Education Database
Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Education
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Education
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
Turkey Database
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Social Science Premium Collection
ProQuest Computing
Education Collection
ProQuest Science Journals (Alumni Edition)
ProQuest Central Basic
ProQuest Education Journals
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Education Journals (Alumni Edition)
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Mathematics
EISSN 1309-4653
EndPage 2044
ExternalDocumentID 10.17762/turcomat.v12i6.4807
10_17762_turcomat_v12i6_4807
GroupedDBID 0-V
5VS
88I
8FE
8FG
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ARALO
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
CJNVE
DWQXO
EDSIH
GNUQQ
HCIFZ
K6V
K7-
KQ8
M0P
M2P
M~E
P62
PHGZM
PHGZT
PIMPY
PQEDU
PQGLB
PQQKQ
PROAC
PUEGO
3V.
7XB
8AL
8FK
EOJEC
JQ2
M0N
OBODZ
PKEHL
PQEST
PQUKI
PRINS
Q9U
ADTOC
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c1707-b373d1af0be0bc9956735024be4ebf2f139333fb6852ea92f38f6c58fc43e5f63
IEDL.DBID BENPR
ISSN 1309-4653
IngestDate Tue Aug 19 19:54:51 EDT 2025
Sat Jul 26 00:22:06 EDT 2025
Thu Apr 24 22:53:51 EDT 2025
Wed Oct 01 04:09:44 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1707-b373d1af0be0bc9956735024be4ebf2f139333fb6852ea92f38f6c58fc43e5f63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2623922873?pq-origsite=%requestingapplication%&accountid=15518
PQID 2623922873
PQPubID 2045096
PageCount 6
ParticipantIDs unpaywall_primary_10_17762_turcomat_v12i6_4807
proquest_journals_2623922873
crossref_primary_10_17762_turcomat_v12i6_4807
crossref_citationtrail_10_17762_turcomat_v12i6_4807
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-04-05
PublicationDateYYYYMMDD 2021-04-05
PublicationDate_xml – month: 04
  year: 2021
  text: 2021-04-05
  day: 05
PublicationDecade 2020
PublicationPlace Gurgaon
PublicationPlace_xml – name: Gurgaon
PublicationTitle Turkish journal of computer and mathematics education
PublicationYear 2021
Publisher Ninety Nine Publication
Publisher_xml – name: Ninety Nine Publication
SSID ssj0001574886
Score 2.1423824
Snippet The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security...
The businesses generate an "intranet" to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security...
SourceID unpaywall
proquest
crossref
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 2039
SubjectTerms Algorithms
Cryptography
Firewalls
Hardness
Integrity
Internet
Intranets
Mathematics
Network security
Networks
Safety
Security
Stability
World Wide Web
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6V7QEuLU9RWpAPXL2b9SvJsepDFYiqEqxUTpHHsaVVV9lVybba_nrGidNSLoC4JnbszNieb6yZbwA-GlEHpzHjqhSWK6cKbrUruHSmLJ1Ebbss_i_n5mymPl3qyy04HnJh6JwlSds-2aAjDIwsEfHxFc4X9GKSJDqpI5n80taTmBQ9UbQYn8C20YTIR7A9O784_N75WrGImtEyZc3ltPcfxriZirkZx_6PrdID1Hy6blZ2c2sXi1-szuku-GG-fbDJ1Xjd4tjd_Ubl-L8_9Bx2Eixlh32jF7Dlm5ewO5R8YOkEeAUXJx3lRMzXZMvAuoADRhiSHce7H8_JitFoDfvsN2zesKPrzapNpNiM4DHrLyB9y76munmvYXZ68u3ojKeiDNxN8yznKHNZT23I0GfoYl5sLjUZevTKYxCBEKWUMqAptPCk6CCLYJwuglPS62DkGxg1y8a_BRa5-wX6IqhSKms01rrADGsMDr32cg_koJTKJcbyWDhjUUXPJaqyGqRbdaqsouT2gN_3WvWMHX9ofzDou0r790clCBWWgrxJmsT4fg381ffe_WuHfXgmYqBMDAfSBzBqr9f-PSGdFj-khfwTk4IFDQ
  priority: 102
  providerName: Unpaywall
Title Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security
URI https://www.proquest.com/docview/2623922873
https://turcomat.org/index.php/turkbilmat/article/download/4807/4040
UnpaywallVersion publishedVersion
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1309-4653
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001574886
  issn: 1309-4653
  databaseCode: KQ8
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1309-4653
  dateEnd: 20221231
  omitProxy: true
  ssIdentifier: ssj0001574886
  issn: 1309-4653
  databaseCode: M~E
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1309-4653
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001574886
  issn: 1309-4653
  databaseCode: BENPR
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1309-4653
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001574886
  issn: 1309-4653
  databaseCode: 8FG
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Turkey Database (ProQuest)
  customDbUrl:
  eissn: 1309-4653
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001574886
  issn: 1309-4653
  databaseCode: EDSIH
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/turkey
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgHIADb8R4KQeugS5p0vaAEI-NAWKagElwqpI0kZBGN9gmtH9P0qUbXIBTDm1TyXZs17W_D-CIk8woJgMcJkTgUIUxFkzFmCqeJIpKJoop_vsWb3bC22f2PAetchbGtVWWPrFw1FlPuRr5CbFxOiE2v6dn_XfsWKPc39WSQkN4aoXstIAYm4cF4pCxKrBwUW-1H2ZVFxZZi-V-hi6ynuDEenb7HmHdQY288mM3Yv0zRs0Sz8VR3hfjT9HtfotBjTVY8ckjOp9oex3mdL4BqyUxA_LndAOW76dgrINNaNcLmAg3Y4l6BhVNAsheR1euXqOxjTzdN5GjOz1Grzm6_Bj3hx7IGtmUFk2KhnqIHj3X3RZ0GvWnyyb2RApY1aIgwpJGNKsJE0gdSOVmWSPKbHCWOtTSEGOzQEqpkTxmRFvlGBobrlhsVEg1M5xuQyXv5XoHkMPbJ1LHJkxoKDiTGYtlIDNplNRM0yrQUnSp8ijjjuyim7qvDSfwtBR4Wgg8dQKvAp4-1Z-gbPxx_36pldSfuUE6s5AqHE819a_9dn_fbw-WiGtlcQ07bB8qw4-RPrC5yFAewnzcuD70ZmbX-tXjTdOunVb7_OUL2Q7mPQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9tAEB5RONAeWkpbNZTSPcBxwdmX7QNCFIJCIRHiIXFzd9e7ElLqBBKE8uf62zrrrJP20vbC2fbKnpmdmR3PNx_AtmKlt9IkVORMU2FFRrW0GeVW5bnlRuoaxd_rq-6N-HYrb5fgZ4OFCW2VjU-sHXU5tKFGvscwTucM83t-MLqngTUq_F1tKDR0pFYo9-sRYxHYceamT3iEG--fHqO-dxg76VwfdWlkGaC2nSYpNTzlZVv7xLjE2AD0TLnEyGWccMYzjykS59wblUnm8M09z7yyMvNWcCe94rjuC1gRXOR4-Fv52ulfXC6qPDLFHaIiZi9Fz7OHkQS_S6P7abM7tRsg3X_GxEWiu_pYjfT0SQ8Gv8W8kzV4HZNVcjizrrew5Kp1eNMQQZDoF9bhVW8-_HX8Di469ViKgOkkQ0_qpgSC18lxqA85ipFu8ENXBOVG7ipy9DAdTeLgbIIpNJkVKd2EXEVuvfdw8ywi_QDL1bByH4GE-f7MuMyLnAutpCllZhJTGm-Nk463gDeiK2ycah7INQZFON0EgReNwIta4EUQeAvo_KnRbKrHP-7fbLRSxD0-LhYW2YLduab-a72Nv6_3BVa7173z4vy0f_YJXrLQRhOaheQmLE8eHt1nzIMmZisaG4Hvz23fvwCiyB7Y
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6V7QEuLU9RWpAPXL2b9SvJsepDFYiqEqxUTpHHsaVVV9lVybba_nrGidNSLoC4JnbszNieb6yZbwA-GlEHpzHjqhSWK6cKbrUruHSmLJ1Ebbss_i_n5mymPl3qyy04HnJh6JwlSds-2aAjDIwsEfHxFc4X9GKSJDqpI5n80taTmBQ9UbQYn8C20YTIR7A9O784_N75WrGImtEyZc3ltPcfxriZirkZx_6PrdID1Hy6blZ2c2sXi1-szuku-GG-fbDJ1Xjd4tjd_Ubl-L8_9Bx2Eixlh32jF7Dlm5ewO5R8YOkEeAUXJx3lRMzXZMvAuoADRhiSHce7H8_JitFoDfvsN2zesKPrzapNpNiM4DHrLyB9y76munmvYXZ68u3ojKeiDNxN8yznKHNZT23I0GfoYl5sLjUZevTKYxCBEKWUMqAptPCk6CCLYJwuglPS62DkGxg1y8a_BRa5-wX6IqhSKms01rrADGsMDr32cg_koJTKJcbyWDhjUUXPJaqyGqRbdaqsouT2gN_3WvWMHX9ofzDou0r790clCBWWgrxJmsT4fg381ffe_WuHfXgmYqBMDAfSBzBqr9f-PSGdFj-khfwTk4IFDQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficiency+of+Using+the+Diffie-Hellman+Key+in+Cryptography+for+Internet+Security&rft.jtitle=Turkish+journal+of+computer+and+mathematics+education&rft.au=Alomari%2C+Ghaith&rft.au=Aljarah%2C+Anas&rft.date=2021-04-05&rft.pub=Ninety+Nine+Publication&rft.eissn=1309-4653&rft.volume=12&rft.issue=6&rft.spage=2039&rft.epage=2044&rft_id=info:doi/10.17762%2Fturcomat.v12i6.4807
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1309-4653&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1309-4653&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1309-4653&client=summon