|
Journals in DBLP
- Christophe Rippert
Protection in flexible operating system architectures. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:8-18 [Journal]
- Wei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:19-25 [Journal]
- Wei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:26-31 [Journal]
- Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo
ID-based password authentication scheme using smart cards and fingerprints. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:32-41 [Journal]
- Min-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu
An authentication scheme for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:42-47 [Journal]
- Ruben Pinilla, Marisa Gil
ULT: a Java threads model for platform independent execution. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:48-62 [Journal]
- Liyong Ren, Bo Chen, Jing Wu
A novel packet-pair-based inferring bandwidth congestion control mechanism for layered multicast. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:63-69 [Journal]
- Shu-Chin Wang, Kuo-Qin Yan, C. F. Cheng
Reaching agreement on an unknown network with partial graphic information. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:70-89 [Journal]
- Carlos Baquero, Nuno Lopes
Towards peer-to-peer content indexing. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:4, pp:90-96 [Journal]
|