Journals in DBLP
Jenn-Wei Lin Providing fault-tolerant authentication and authorization in wireless mobile IP networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:149-163 [Journal ] Xiaofeng Chen , Fangguo Zhang , Shengli Liu ID-based restrictive partially blind signatures and applications. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:164-171 [Journal ] Jun Shao , Zhenfu Cao , Rongxing Lu Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal ] Miguel Correia , Nuno Ferreira Neves , Lau Cheuk Lung , Paulo Veríssimo Worm-IT - A wormhole-based intrusion-tolerant group communication system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:178-197 [Journal ] Hsung-Pin Chang , Ray-I Chang , Wei Kuan Shih , Ruei-Chuan Chang GSR: A global seek-optimizing real-time disk-scheduling algorithm. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:198-215 [Journal ] Alfredo De Santis , Barbara Masucci New results on non-perfect sharing of multiple secrets. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:216-223 [Journal ] Richard Lai , Tony Tsang Timed verification of the reliable adaptive multicast protocol. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:224-239 [Journal ] Marwan Abi-Antoun , Jonathan Aldrich , Wesley Coelho A case study in re-engineering to enforce architectural control flow and data sharing. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:240-264 [Journal ] Liming Zhu , Ngoc Bao Bui , Yan Liu , Ian Gorton MDABench: Customized benchmark generation using MDA. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:2, pp:265-282 [Journal ]