SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Jennehag Ulf 1972 ) "

Sökning: WFRF:(Jennehag Ulf 1972 )

  • Resultat 1-21 av 21
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Beltramelli, Luca, et al. (författare)
  • Hybrid MAC Mechanism for Energy Efficient Communication in IEEE 802.11ah
  • 2017
  • Ingår i: Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT). - : IEEE. - 9781509053209 ; , s. 1295-1300
  • Konferensbidrag (refereegranskat)abstract
    • Many applications for machine-to-machine (M2M) communications are characterized by large numbers of devices with sporadic transmissions and subjected to low energy budgets. This work addresses the importance of energy consumption by proposing a new Medium Access Control (MAC) mechanism for improving the energy efficiency of IEEE 802.11ah, a standard targeting M2M communication. We propose to use the features of IEEE 802.11ah MAC to realize a hybrid contention-reservation mechanism for the transmission of uplink traffic. In the proposed mechanism, any device with a buffered packet will first notify the Access Point (AP) during a contention phase before being given a reserved timeslot for the data transmission. We develop a mathematical model to analyse the energy consumption ofthe proposed mechanism and of IEEE 802.11ah. The results show that for a monitoring scenario, the proposed contention reservation mechanism reduces the energy consumption for a successful uplink data transmission by up to 55%.
  •  
2.
  • Beltramelli, Luca, et al. (författare)
  • Interference Modelling in a Multi-Cell LoRa System
  • 2018
  • Ingår i: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). - : IEEE. - 9781538668764
  • Konferensbidrag (refereegranskat)abstract
    • As the market for low-power wide-area network (LPWAN) technologies expands and the number of connected devices increases, it is becoming important to investigate the performance of LPWAN candidate technologies in dense deployment scenarios. In dense deployments, where the networks usually exhibit the traits of an interference-limited system, a detailed intra- and inter-cell interference analysis of LPWANs is required. In this paper, we model and analyze the performance of uplink communication of a LoRa link in a multi-cell LoRa system. To such end, we use mathematical tools from stochastic geometry and geometric probability to model the spatial distribution of LoRa devices. The model captures the effects of the density of LoRa cells and the allocation of quasi-orthogonal spreading factors (SF) on the success probability of the LoRa transmissions. To account for practical deployment of LoRa gateways, we model the spatial distribution of the gateways with a Poisson point process (PPP) and Matèrn hard-core point process (MHC). Using our analytical formulation, we find the uplink performance in terms of success probability and potential throughput for each of the available SF in LoRa’s physical layer. Our results show that in dense multi-cell LoRa deployment with uplink traffic, the intercell interference noticeably degrades the system performance.
  •  
3.
  • Beltramelli, Luca, et al. (författare)
  • Modeling of Enhanced Distributed Channel Access with Station Grouping: A Throughput Analysis
  • 2018
  • Ingår i: Proc. IEEE 88th Vehicular Technology Conference (VTC'18-fall), Chicago, USA, Aug. 2018.. - : IEEE conference proceedings.
  • Konferensbidrag (refereegranskat)abstract
    • Machine to Machine (M2M) communication networksare expected to connect a large number of power constrained devices in long range applications with differentquality of service (QoS) requirements. Medium access control with QoS support such as the Enhanced Distributed Channel Access (EDCA) defined by IEEE 802.11e provides traffic differentiation and corresponding priority classes, which guarantees QoSaccording to the needs of applications. In this paper, we employa station grouping mechanism for enhancing the scalability of EDCA to handle the massive number of access attempts expected in large M2M networks. Furthermore, we develop a discrete time Markov chain (DTMC) model to analyze the performance of EDCA with station grouping. Using the developed DTMC model, we calculate throughput for each access category as well as for different combinations of grouping and EDCA parameters. Thenumerical results show that the model can precisely reveal the behavior of EDCA mechanism. Moreover, it is demonstrated that employing the proposed grouping mechanism for EDCA increasesthe normalized throughput significantly for all classes of priority.
  •  
4.
  • Ferrari, Nico, et al. (författare)
  • Lightweight Group-Key Establishment Protocol for IoT Devices: Implementation and Performance Analyses
  • 2018
  • Ingår i: 2018 Fifth International Conference on Internet of Things. - : IEEE. - 9781538695852
  • Konferensbidrag (refereegranskat)abstract
    • In the context of Internet of Things (IoT), groupcommunication is an efficient and fast way of broadcastinggroup messages. The message needs to be sent securely tomaintain confidentiality of data and privacy of users. Estab-lishing cryptographically secure communication links betweena group of transceivers requires the pre-agreement upon somekey, unknown to an external attacker. Complex and resource-intensive security schemes are infeasible for devices with limitedcomputational capabilities. In this paper, we implement alightweight and computationally secure group key establish-ment scheme suitable for resource constrained IoT networks.The proposed scheme is based on elliptic curve cryptographyand cryptographic one-way accumulators. We analyze its fea-sibility by implementing it in the Contiki operating system andsimulating it with the Cooja simulator. The simulation resultsdemonstrate the feasibility of the scheme and its computationaland communication costs are also comparable with otherexisting approaches, with an energy consumption of only 109mJ per node for group key establishment.
  •  
5.
  • Forsström, Stefan, 1984-, et al. (författare)
  • Challenges of Securing the Industrial Internet of Things Value Chain
  • 2018
  • Ingår i: 2018 Workshop on Metrology for Industry 4.0 and IoT, MetroInd 4.0 and IoT 2018 - Proceedings. - : IEEE. - 9781538624975 - 9781538624982 ; , s. 218-223
  • Konferensbidrag (refereegranskat)abstract
    • We see a shift from todays Internet-of-Things (IoT)to include more industrial equipment and metrology systems,forming the Industrial Internet of Things (IIoT). However, thisleads to many concerns related to confidentiality, integrity,availability, privacy and non-repudiation. Hence, there is a needto secure the IIoT in order to cater for a future with smart grids,smart metering, smart factories, smart cities, and smart manufacturing.It is therefore important to research IIoT technologiesand to create order in this chaos, especially when it comes tosecuring communication, resilient wireless networks, protectingindustrial data, and safely storing industrial intellectual propertyin cloud systems. This research therefore presents the challenges,needs, and requirements of industrial applications when it comesto securing IIoT systems.
  •  
6.
  • Gebremichael, Teklay, 1985- (författare)
  • Lightweight Cryptographic Group Key Management Protocols for the Internet of Things
  • 2019
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques.A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group.This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group.The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process.To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.
  •  
7.
  • Gebremichael, Teklay, 1985-, et al. (författare)
  • Lightweight IoT Group Key Establishment Scheme from the One Time Pad
  • 2019
  • Ingår i: 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). - : IEEE.
  • Konferensbidrag (refereegranskat)abstract
    • Secure group communication in the Internet ofThings (IoT) entails the establishment and management of one or more group keys to provide group security services such as confidentiality of group messages. The main challenges in establishing a group key consist in designing a group key establishment scheme that is feasible for nodes with limited computational capabilities. In this paper, we propose a lightweight group key establishment scheme based on fast symmetric-key encryption. We show a mechanism for designing a lightweight and secure IoT group key establishment and management scheme whose security is underpinned by the perfect secrecy provided by the One-time-pad. We then argue that the scheme is convenient for IoT group applications where nodes are resource-constrained. We prove that our scheme is secure under a threat model where the attacker has sufficiently large computational power. We also prove that the scheme provides desired group security properties such as confidentiality, key secrecy and independent group session keys generation.
  •  
8.
  • Gebremichael, Teklay, 1985-, et al. (författare)
  • Lightweight IoT Group Key Establishment Scheme Using One-way Accumulator
  • 2018
  • Ingår i: 2018 International Symposium on Networks, Computers and Communications (ISNCC). - : IEEE. - 9781538637791
  • Konferensbidrag (refereegranskat)abstract
    • Group communication in the context of Internetof Things (IoT) is an efficient and fast way of broadcasting group messages. A message needs to be sent securely to maintain confidentiality of data and privacy of users. The main challenges in sharing group keys consist in designing and implementing a group key establishment scheme that is feasible for devices with limited computational capabilities. Existing group establishment schemes do not offer a good solution for resource-constrained IoTdevices, a solution that provides secure group key management procedures when new nodes join or leave the group without com-promising the security of the system. In this paper, we propose a light weight and computationally secure group key establishment scheme suitable for resource constrained IoT networks. The proposed scheme is based on elliptic curve cryptography and cryptographic one-way accumulators. We show how to combine the aforementioned concepts to design a group key establishment scheme that guarantees both forward and backward secrecy. Finally, we show how the established group key is updated when the group size dynamically changes and how the proposed solution can be used with block and stream ciphers.
  •  
9.
  •  
10.
  • Lavassani, Mehrzad (författare)
  • Reliable Information Exchange in IIoT : Investigation into the Role of Data and Data-Driven Modelling
  • 2018
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The concept of Industrial Internet of Things (IIoT) is the tangible building block for the realisation of the fourth industrial revolution. It should improve productivity, efficiency and reliability of industrial automation systems, leading to revenue growth in industrial scenarios. IIoT needs to encompass various disciplines and technologies to constitute an operable and harmonious system. One essential requirement for a system to exhibit such behaviour is reliable exchange of information. In industrial automation, the information life-cycle starts at the field level, with data collected by sensors, and ends at the enterprise level, where that data is processed into knowledge for business decision making. In IIoT, the process of knowledge discovery is expected to start in the lower layers of the automation hierarchy, and to cover the data exchange between the connected smart objects to perform collaborative tasks.This thesis aims to assist the comprehension of the processes for information exchange in IIoT-enabled industrial automation- in particular, how reliable exchange of information can be performed by communication systems at field level given an underlying wireless sensor technology, and how data analytics can complement the processes of various levels of the automation hierarchy. Furthermore, this work explores how an IIoT monitoring system can be designed and developed.The communication reliability is addressed by proposing a redundancy-based medium access control protocol for mission-critical applications, and analysing its performance regarding real-time and deterministic delivery. The importance of the data and the benefits of data analytics for various levels of the automation hierarchy are examined by suggesting data-driven methods for visualisation, centralised system modelling and distributed data streams modelling. The design and development of an IIoT monitoring system are addressed by proposing a novel three-layer framework that incorporates wireless sensor, fog, and cloud technologies. Moreover, an IIoT testbed system is developed to realise the proposed framework.The outcome of this study suggests that redundancy-based mechanisms improve communication reliability. However, they can also introduce drawbacks, such as poor link utilisation and limited scalability, in the context of IIoT. Data-driven methods result in enhanced readability of visualisation, and reduced necessity of the ground truth in system modelling. The results illustrate that distributed modelling can lower the negative effect of the redundancy-based mechanisms on link utilisation, by reducing the up-link traffic. Mathematical analysis reveals that introducing fog layer in the IIoT framework removes the single point of failure and enhances scalability, while meeting the latency requirements of the monitoring application. Finally, the experiment results show that the IIoT testbed works adequately and can serve for the future development and deployment of IIoT applications.
  •  
11.
  • Qureshi, Umair Mujtaba, et al. (författare)
  • Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things
  • 2018
  • Ingår i: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. - : IEEE. - 9781509066841 ; , s. 5246-5251
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we present an overview of the variousproximity based authentication mechanisms that can be usedin the Industrial Internet of Things (IIoT). We seek to identifyand highlight from a holistic point of view which mechanismscan enable proximity based authentication for the IndustrialInternet of Things. In addition, we identify which upcomingproximity authentication mechanisms are most important for theproliferation of the Industrial Internet of Things, and highlightmajor obstacles that remain unsolved with regard to authen-tication. In answering this, we present seven mechanisms forproximity based authentication (i.e. wire, radio, acoustics, light,image, gesture and biometrics) and discuss each mechanism inperspective of their vulnerability to different kind of attacks (suchas eavesdropping, impersonation and denial of service attacksetc.) and their usability (such as proximity range, hardwarerequirement and ease of use) in terms of the practicality in IIoTenvironment in the light of which we present two typical IIoTuse cases that require proximity based authentication.
  •  
12.
  • Sisinni, Emiliano, et al. (författare)
  • Industrial Internet of Things : Challenges, Opportunities, and Directions
  • 2018
  • Ingår i: IEEE Transactions on Industrial Informatics. - 1551-3203 .- 1941-0050. ; 14:11, s. 4724-4734
  • Tidskriftsartikel (refereegranskat)abstract
    • Internet of Things (IoT) is an emerging domain that promises ubiquitous connection to the Internet, turning common objects into connected devices. The IoT paradigm is changing the way people interact with things around them. It paves the way to creating pervasively connected infrastructures to support innovative services and promises better flexibility and efficiency. Such advantages are attractive not only for consumer applications, but also for the industrial domain. Over the last few years, we have been witnessing the IoT paradigm making its way into the industry marketplace with purposely designed solutions. In this paper, we clarify the concepts of IoT, Industrial IoT, and Industry 4.0. We highlight the opportunities brought in by this paradigm shift as well as the challenges for its realization. In particular, we focus on the challenges associated with the need of energy efficiency, real-time performance, coexistence, interoperability, and security and privacy. We also provide a systematic overview of the state-of-the-art research efforts and potential research directions to solve Industrial IoT challenges.
  •  
13.
  • Forsström, Stefan, 1984-, et al. (författare)
  • A Performance and Cost Evaluation of Combining OPC-UAand Microsoft Azure IoT Hub into an Industrial Internet-of-Things System
  • 2017
  • Ingår i: GIoTS 2017 - Global Internet of Things Summit, Proceedings. - : IEEE. - 9781509058730 ; , s. 327-332
  • Konferensbidrag (refereegranskat)abstract
    • The expected monetary costs and response time performance is important information to know before deploying an industrial Internet-of-Things system. The system investigated in this paper is built up by combining the Open Plant Communication Universal Architecture and the Microsoft Azure Internet-of-Things Hub. We consider a real life industrial scenario that remotely monitors a piece of industrial equipment consisting of 1500 sensors, of which 600 update their values every second. The measured results show that the response times for a fiber based Internet connection was on average 770 ms with a standard deviation of 330 ms and the same measurements on a mobile internet connection was on average 1150 ms with a standard deviation of 340 ms. Cost wise, the investigated scenario fits within the most expensive price plan for the IoT hub and ends in a total of just over $5000 per month for the whole cloud service.
  •  
14.
  • Forsström, Stefan, 1984-, et al. (författare)
  • A Plain Low Threshold IoT Platform for Enabling New IoT Products from SMEs
  • 2020
  • Ingår i: 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT. - : IEEE. - 9781728148922 ; , s. 390-394
  • Konferensbidrag (refereegranskat)abstract
    • Many small and medium enterprises have existing products that they want to innovate on and move into the new era of Internet of Things. Because of this, we have developed a plain Internet of Things platform aimed towards businesses who wants to try out these new systems but does not have the resources to develop or maintain a full platform from the traditional providers. We have developed an open source solution that can be run on cheap off the shelf hardware and employs today's de facto standards for Internet of Things systems. Our solution also provides adequate functionality for an initial effort and innovation, including taking security and privacy concerns into consideration. We have also evaluated our implementation in terms of scale, which shows that the system scales well in scenarios with up to 50 sensor values per second. Which should be enough for a small business first effort to try out their products as an Internet of Things service. 
  •  
15.
  • Forsström, Stefan, 1984-, et al. (författare)
  • An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous Agents
  • 2019
  • Ingår i: COINS '19 Proceedings of the International Conference on Omni-Layer Intelligent Systems. - New York, NY, USA : ACM Digital Library. - 9781450366403 ; , s. 116-121
  • Konferensbidrag (refereegranskat)abstract
    • This article presents a system for creating an implemented open energy market for future smart grid systems, microgrids, the Internet of Things, and the Industrial Internet of Things. We also investigate and analyze different aspects of blockchain technologies for this purpose in order to choose the appropriate methods, technologies, and approaches for realizing and implementing the system as an open source project. Based on this analysis, we present our resulting functional implementation of this energy market. Including measurements and a quantitative evaluation of the implementation itself. Showing the potential of the approach, where this implantation can be applied, showing its drawbacks, and finally our planned future work.
  •  
16.
  •  
17.
  • Gebremichael, Teklay, 1985-, et al. (författare)
  • Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors
  • 2022
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 22:11
  • Tidskriftsartikel (refereegranskat)abstract
    • Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we address the problem of establishing such a key using a lattice-based one-way function, which can easily be inverted using a suitably designed lattice trapdoor. Using the notion of a bad/good basis, we present a new method of coupling multiple private keys into a single public key, which is then used for encrypting a group message. The protocol has the apparent advantage of having a conjectured resistance against poten-tial quantum-computer-based attacks. All functions—key establishment, session key update, node addition, encryption, and decryption—are effected in constant time, using simple linear-algebra operations, making the protocol suitable for resource-constrained IoT networks. We show how a cryptographic session group key can be constructed on the fly by a user with legitimate credentials, making node-capture-type attacks impractical. The protocol also incorporates a mechanism for node addition and session-key generation in a forward-and backward-secrecy-preserving manner. © 2022 by the authors. 
  •  
18.
  • Jennehag, Ulf, 1972- (författare)
  • Bandwidth Efficient IPTV Distribution : On Error Resilience and Fast Channel Change
  • 2007
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Television is now changing its traditional distribution forms to being distributed digitally over broadband networks. The recent development of broadband Internet connectivity has made the transition to Internet Protocol Television (IPTV) possible. When changing distribution technique of an existing service, it is important that the new technique does not make the service worse from the user’s point of view. Although a broadband network offers high capacity and has excellent performance there will be occasional packet losses and delays which could negatively influence the user experience of the delivered broadband service. Since bandwidth is a key constraint for video distribution there is a strong incentive for finding schemes to increase bandwidth utilization, especially when distributing high bandwidth IPTV services. In digital video coding it is common to use predictive coding to remove temporal redundancy in video sequences. This technique greatly increases the coding efficiency but makes the sequence more sensitive to information loss or delay. In addition, the use of predictive coding also introduce a inter frame dependency which could make the channel change significantly slower. This thesis addresses two important areas related to bandwidth efficient IPTV distribution, namely error resilience and fast channel change. A method to numerically estimate the decoded objective video quality of scalable coded video is presented and evaluated. The method can be used to estimate objective video quality for a scalable video transmission system subject to packet-loss. The quality gain of temporally scalable video in a priority packet dropping environment is also investigated and quantified. Synchronization Frames for Channel Switching (SFCS) is proposed as a method to code and distribute video with IP-multicast, which can be used to efficiently combat packet-loss, increase bandwidth utilization, and offer a channel change speed up. The performance of SFCS is analyzed and bandwidth estimation expressions are formulated, analytical results are complemented with computer simulations. The results show that SFCS deployed in an IPTV delivery system can significantly lower the bandwidth consumption and speed up the channel change.
  •  
19.
  • Lavassani, Mehrzad, et al. (författare)
  • Combining Fog Computing with Sensor Mote Machine Learning for Industrial IoT
  • 2018
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 18:5
  • Tidskriftsartikel (refereegranskat)abstract
    • Digitalization is a global trend becoming ever more important to our connected and sustainable society. This trend also affects industry where the Industrial Internet of Things is an important part, and there is a need to conserve spectrum as well as energy when communicating data to a fog or cloud back-end system. In this paper we investigate the benefits of fog computing by proposing a novel distributed learning model on the sensor device and simulating the data stream in the fog, instead of transmitting all raw sensor values to the cloud back-end. To save energy and to communicate as few packets as possible, the updated parameters of the learned model at the sensor device are communicated in longer time intervals to a fog computing system. The proposed framework is implemented and tested in a real world testbed in order to make quantitative measurements and evaluate the system. Our results show that the proposed model can achieve a 98% decrease in the number of packets sent over the wireless link, and the fog node can still simulate the data stream with an acceptable accuracy of 97%. We also observe an end-to-end delay of 180 ms in our proposed three-layer framework. Hence, the framework shows that a combination of fog and cloud computing with a distributed data modeling at the sensor device for wireless sensor networks can be beneficial for Industrial Internet of Things applications.
  •  
20.
  •  
21.
  • Zanni, Alessandro, et al. (författare)
  • Elastic Provisioning of Internet of Things Services using Fog Computing : an Experience Report
  • 2018
  • Ingår i: 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). - : IEEE. - 9781538648797 - 9781538648803 ; , s. 17-22
  • Konferensbidrag (refereegranskat)abstract
    • The adoption of cloud and fog computing techniquesfor elastic provisioning of quality-constrained industrial Internet of Things (IoT) services is largely envisioned as very promising, but experience reports and lessons learned from real deployment still lack. To fill this gap, this paper presents andreports the evaluation of a system consisting of virtual services in a combined fog, cloud, and IoT setting, made up of multiple devices with varying computation capabilities. In particular,we have utilized and integrated off-the-shelf solutions into our architecture and have experimentally investigated the benefits of virtualization to move and redeploy mobile components to the fog nodes closest to the targeted end devices. In addition, the paper proposes an original solution to dynamically scale and provision the resources for the fog computing layer by using geometric monitoring. The reported results show the feasibility and efficiency of the proposed exploitation of both fog and cloud virtualized resources to enable scalability in the domain of IoT-assisted mobile presence services.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-21 av 21

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy