default search action
Shahin Tajik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 574-602 (2024) - [c39]Tasnuva Farheen, Sourav Roy, Andrew Cannon, Jia Di, Shahin Tajik, Domenic Forte:
Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack. ACM Great Lakes Symposium on VLSI 2024: 564-568 - [c38]Tasnuva Farheen, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte:
Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks. HOST 2024: 211-221 - [i31]Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik:
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations. CoRR abs/2401.08925 (2024) - [i30]Maryam Saadat-Safa, Patrick Schaumont, Shahin Tajik:
Parasitic Circus: On the Feasibility of Golden Free PCB Verification. CoRR abs/2403.12252 (2024) - [i29]Saleh Khalaj Monfared, Kyle Mitard, Andrew Cannon, Domenic Forte, Shahin Tajik:
LaserEscape: Detecting and Mitigating Optical Probing Attacks. CoRR abs/2405.03632 (2024) - [i28]Aleksa Deric, Kyle Mitard, Shahin Tajik, Daniel E. Holcomb:
Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques. CoRR abs/2405.14821 (2024) - [i27]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Cryptol. ePrint Arch. 2024: 72 (2024) - [i26]Tahoura Mosavirik, Shahin Tajik:
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring. IACR Cryptol. ePrint Arch. 2024: 631 (2024) - [i25]Mohammad Hashemi, Dev M. Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji:
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. IACR Cryptol. ePrint Arch. 2024: 980 (2024) - 2023
- [j14]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version). J. Cryptogr. Eng. 13(4): 485-499 (2023) - [j13]Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik:
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 301-325 (2023) - [j12]Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 238-261 (2023) - [j11]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. ACM Trans. Design Autom. Electr. Syst. 28(2): 16:1-16:57 (2023) - [j10]Tasnuva Farheen, Sourav Roy, Shahin Tajik, Domenic Forte:
A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack. IEEE Trans. Very Large Scale Integr. Syst. 31(1): 65-78 (2023) - [c37]Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. CCS 2023: 1675-1689 - [c36]Maryam Saadat-Safa, Tahoura Mosavirik, Shahin Tajik:
Counterfeit Chip Detection using Scattering Parameter Analysis. DDECS 2023: 99-104 - [c35]Andrew Cannon, Tasnuva Farheen, Sourav Roy, Shahin Tajik, Domenic Forte:
Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch. ICCAD 2023: 1-9 - [c34]Tasnuva Farheen, Shahin Tajik, Domenic Forte:
SPRED: Spatially Distributed Laser Fault Injection Resilient Design. ISQED 2023: 1-8 - [c33]Sourav Roy, Shahin Tajik, Domenic Forte:
Polymorphic Sensor to Detect Laser Logic State Imaging Attack. ISQED 2023: 1-8 - [c32]Sajjad Parvin, Mehran Goli, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler:
LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing. ISVLSI 2023: 1-6 - [i24]Maryam Saadat-Safa, Tahoura Mosavirik, Shahin Tajik:
Counterfeit Chip Detection using Scattering Parameter Analysis. CoRR abs/2302.11034 (2023) - [i23]Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. CoRR abs/2310.07014 (2023) - [i22]Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. IACR Cryptol. ePrint Arch. 2023: 75 (2023) - [i21]Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. IACR Cryptol. ePrint Arch. 2023: 693 (2023) - 2022
- [j9]Tahoura Mosavirik, Fatemeh Ganji, Patrick Schaumont, Shahin Tajik:
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network. ACM J. Emerg. Technol. Comput. Syst. 18(4): 65:1-65:24 (2022) - [c31]Sajjad Parvin, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler:
Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques. ASP-DAC 2022: 429-435 - [c30]David Selasi Koblah, Fatemeh Ganji, Domenic Forte, Shahin Tajik:
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities. MTD@CCS 2022: 25-36 - [c29]Sourav Roy, Tasnuva Farheen, Shahin Tajik, Domenic Forte:
Self-timed Sensors for Detecting Static Optical Side Channel Attacks. ISQED 2022: 1-6 - [c28]Muhtadi Choudhury, Minyan Gao, Shahin Tajik, Domenic Forte:
TAMED: Transitional Approaches for LFI Resilient State Machine Encoding. ITC 2022: 46-55 - [p2]Shahin Tajik, Fatemeh Ganji:
Artificial Neural Networks and Fault Injection Attacks. Security and Artificial Intelligence 2022: 72-84 - [p1]Fatemeh Ganji, Shahin Tajik:
Physically Unclonable Functions and AI - Two Decades of Marriage. Security and Artificial Intelligence 2022: 85-106 - [i20]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. CoRR abs/2204.09579 (2022) - [i19]Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik:
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. IACR Cryptol. ePrint Arch. 2022: 946 (2022) - 2021
- [j8]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j7]M. Tanjidur Rahman, Nusrat Farzana, Dhwani Mehta, Shahin Tajik, Mark M. Tehranipoor, Navid Asadizanjani:
CONCEALING-Gate: Optical Contactless Probing Resilient Design. ACM J. Emerg. Technol. Comput. Syst. 17(3): 39:1-39:25 (2021) - [c27]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. ASHES@CCS 2021: 17-27 - [c26]Muhtadi Choudhury, Domenic Forte, Shahin Tajik:
PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs. DATE 2021: 569-574 - [c25]Muhtadi Choudhury, Shahin Tajik, Domenic Forte:
SPARSE: Spatially Aware LFI Resilient State Machine Encoding. HASP@MICRO 2021: 1:1-1:8 - [c24]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. SP 2021: 1955-1971 - [c23]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. USENIX Security Symposium 2021: 627-644 - [c22]Elham Amini, Kai Bartels, Christian Boit, Marius Eggert, Norbert Herfurth, Tuba Kiyan, Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities. VTS 2021: 1-12 - [i18]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. CoRR abs/2102.11656 (2021) - [i17]Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont:
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack. CoRR abs/2106.13784 (2021) - [i16]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. CoRR abs/2107.10147 (2021) - [i15]Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont:
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2021: 878 (2021) - 2020
- [j6]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-depth: A recipe for logic locking to prevail. Integr. 72: 39-57 (2020) - [j5]Tamzidul Hoque, Kai Yang, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(1): 4:1-4:32 (2020) - [c21]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c20]M. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark M. Tehranipoor, Navid Asadizanjani:
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. HOST 2020: 262-272 - [c19]Andrew Stern, Dhwani Mehta, Shahin Tajik, Farimah Farahmandi, Mark M. Tehranipoor:
SPARTA: A Laser Probing Approach for Trojan Detection. ITC 2020: 1-10 - [i14]Shahin Tajik, Fatemeh Ganji:
Artificial Neural Networks and Fault Injection Attacks. CoRR abs/2008.07072 (2020) - [i13]Fatemeh Ganji, Shahin Tajik:
Physically Unclonable Functions and AI: Two Decades of Marriage. CoRR abs/2008.11355 (2020) - [i12]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. CoRR abs/2009.04263 (2020)
2010 – 2019
- 2019
- [c18]Md. Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark M. Tehranipoor, Domenic Forte:
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions. FDTC 2019: 48-55 - [c17]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [i11]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-Depth: A Recipe for Logic Locking to Prevail. CoRR abs/1907.08863 (2019) - [i10]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i9]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019) - 2018
- [j4]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 573-595 (2018) - [c16]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
A Fourier Analysis Based Attack Against Physically Unclonable Functions. Financial Cryptography 2018: 310-328 - [c15]M. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Hao-Ting Shen, Damon L. Woodard, Mark M. Tehranipoor, Navid Asadizanjani:
Physical Inspection & Attacks: New Frontier in Hardware Security. IVSW 2018: 93-102 - [i8]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs. IACR Cryptol. ePrint Arch. 2018: 717 (2018) - 2017
- [b1]Shahin Tajik:
On the physical security of physically unclonable functions. Technical University of Berlin, Germany, 2017 - [j3]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Having no mathematical model may not secure PUFs. J. Cryptogr. Eng. 7(2): 113-128 (2017) - [j2]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
Photonic Side-Channel Analysis of Arbiter PUFs. J. Cryptol. 30(2): 550-571 (2017) - [c14]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. CCS 2017: 1661-1674 - [c13]Shahin Tajik, Julian Fietkau, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
PUFMon: Security monitoring of FPGAs using physically unclonable functions. IOLTS 2017: 186-191 - [i7]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2017: 551 (2017) - [i6]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. IACR Cryptol. ePrint Arch. 2017: 822 (2017) - 2016
- [j1]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC learning of arbiter PUFs. J. Cryptogr. Eng. 6(3): 249-258 (2016) - [c12]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. CHES 2016: 147-167 - [c11]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack Against PUFs with No Mathematical Model. CHES 2016: 391-411 - [i5]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. IACR Cryptol. ePrint Arch. 2016: 593 (2016) - [i4]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack against PUFs with No Mathematical Model. IACR Cryptol. ePrint Arch. 2016: 606 (2016) - 2015
- [c10]Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik:
Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS 2015: 1070-1080 - [c9]Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert, Christian Boit:
Laser Fault Attack on Physically Unclonable Functions. FDTC 2015: 85-96 - [c8]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. ICISC 2015: 345-358 - [c7]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. TRUST 2015: 22-39 - [i3]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2015: 378 (2015) - [i2]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family. IACR Cryptol. ePrint Arch. 2015: 871 (2015) - 2014
- [c6]Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. CHES 2014: 493-509 - [c5]Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, Shahin Tajik, Jean-Pierre Seifert:
Physical vulnerabilities of Physically Unclonable Functions. DATE 2014: 1-4 - [c4]Shahin Tajik, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit:
Emission Analysis of Hardware Implementations. DSD 2014: 528-534 - [c3]Mehran Roshandel, Aarti Munjal, Peyman Moghadam, Shahin Tajik, Hamed Ketabdar:
Multi-sensor Finger Ring for Authentication Based on 3D Signatures. HCI (2) 2014: 131-138 - [c2]Mehran Roshandel, Aarti Munjal, Peyman Moghadam, Shahin Tajik, Hamed Ketabdar:
Multi-sensor Based Gestures Recognition with a Smart Finger Ring. HCI (2) 2014: 316-324 - [i1]Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2014: 802 (2014) - 2013
- [c1]Shahin Tajik, Ahmad Rostami:
MultiFlow: Enhancing IP Multicast over IEEE 802.11 WLAN. Wireless Days 2013: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint