Journals in DBLP
Geoffrey M. Voelker Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:3-8 [Journal ] Ross J. Anderson , Francesco Bergadano , Bruno Crispo , Jong-Hyeon Lee , Charalampos Manifavas , Roger M. Needham A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal ] Chris J. Mitchell , Chan Yeob Yeun Fixing a Problem in the Helsinki Protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:21-24 [Journal ] Danai Patiyoot , S. J. Shepherd Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:25-32 [Journal ] Marc Joye , Sung-Ming Yen ID-based Secret-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:33-39 [Journal ] Bernhard Wagner Controlling Cgi Programs. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:40-46 [Journal ] Winfried E. Kühnhauser A Classification of Interdomain Actions. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:47-61 [Journal ] Stein Jørgen Ryan Synchronization in Portable Device Drivers. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:62-69 [Journal ] Xiaohui Wei , Jiubin Ju SFT: A Consistent Checkpointing Algorithm With Shorter Freezing Time. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:70-76 [Journal ] Steven Robbins Introducing Empirical Investigation in Undergraduate Operating Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:77-80 [Journal ]