Wei-Chi Ku A hash-based strong-password authentication scheme without using smart cards. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:1, pp:29-34 [Journal]
Yuqing Zhang, Xiuying Liu An approach to the formal verification of the three-principal cryptographic protocols. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:1, pp:35-42 [Journal]
B. Gupta, Z. Liu, Z. Liang On designing direct dependency: based fast recovery algorithms for distributed systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:1, pp:58-73 [Journal]