Journals in DBLP
Siaw-Lynn Ng Comments on ``On the Security of Three-Party Cryptographic Protocs'' by Xu, Zhang and Zhu. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:5-6 [Journal ] David Kotz , Robert S. Gray Mobile Agents and the Future of the Internet. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:7-13 [Journal ] Mahadev Satyanarayanan , Jason Flinn , Kevin R. Walker Visual Proxy: Exploiting OS Customizations without Application Source Code. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:14-18 [Journal ] Jong-Hyeon Lee The Big Brother Ballot. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:19-25 [Journal ] Danai Patiyoot , S. J. Shepherd Modeling and Evaluation of security induced delays in Wireless ATM Networks. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:26-31 [Journal ] Hai Jin On-the-fly Reconstruction of Failed Disk in RAID. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:32-42 [Journal ] Sung-Il Kang , Kihyun Pyun , Heung-Kyu Lee Performance Evaluation of Non-preemptive Policies for Scheduling Readers and Writers. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:43-61 [Journal ]