The SCEAS System
Navigation Menu

Journals in DBLP

Operating Systems Review
2005, volume: 39, number: 1

  1. Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen
    X-RDR: a role-based delegation processor for web-based information systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:4-21 [Journal]
  2. Jia Song
    Segment-based proxy caching for distributed cooperative media content servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:22-33 [Journal]
  3. Chuan Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou
    A LVQ-based neural network anti-spam email approach. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:34-39 [Journal]
  4. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
  5. Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang
    A new multi-stage secret sharing scheme using one-way function. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:48-55 [Journal]
  6. Meng-shu Hou, Xianliang Lu, Xu Zhou, Chuan Zhan
    A trust model of p2p system based on confirmation theory. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:56-62 [Journal]
  7. Xu Zhou, Xianliang Lu, Meng-shu Hou, Chuan Zhan
    A speed-based adaptive dynamic parallel downloading technique. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:63-69 [Journal]
  8. Ya-Fen Chang, Chin-Chen Chang
    An efficient authentication protocol for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:70-84 [Journal]
  9. Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang
    Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:85-89 [Journal]
  10. Wei-Chi Ku, Shuai-Min Chen
    Cryptanalysis of a flexible remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:90-96 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002