default search action
Operating Systems Review, Volume 38, 2004
Volume 38, Number 1, January 2004
- Winfried E. Kühnhauser:
Root Kits: an operating systems viewpoint. 12-23 - Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo:
Cryptanalysis of a user authentication scheme using hash functions. 24-28 - Wei-Chi Ku:
A hash-based strong-password authentication scheme without using smart cards. 29-34 - Yuqing Zhang, Xiuying Liu:
An approach to the formal verification of the three-principal cryptographic protocols. 35-42 - Bu-Sung Lee, Wing-Keong Woo, Chai Kiat Yeo, Teck Meng Lim, Bee-Hwa Lim, Yuxiong He, Jie Song:
Secure communications between bandwidth brokers. 43-57 - B. Gupta, Z. Liu, Z. Liang:
On designing direct dependency: based fast recovery algorithms for distributed systems. 58-73 - Mahfoud Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer:
Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. 74-89 - Qingsong Wei, Bo Chen, Xianliang Lu, Liyong Ren, Xu Zhou:
The research of the distributed stripped storage spatial model. 90-96
Volume 38, Number 2, April 2004
- Jeanna Neefe Matthews:
The case for repeated research in operating systems. 5-7 - Melekam Tsegaye, Richard Foss:
A comparison of the Linux and Windows device driver architectures. 8-33 - Yuqing Zhang, Xiuying Liu:
Running-mode analysis of the Security Socket Layer protocol. 34-40 - Shu-Ching Wang, Kuo-Qin Yan:
Revisiting fault diagnosis agreement in a new territory. 41-61 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
A secure user authentication scheme using hash functions. 62-68 - Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo:
A security scheme for protecting security policies in firewall. 69-72 - Michael Scott:
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. 73-75 - Min-Hui Lin, Chin-Chen Chang:
A secure one-time password authentication scheme with low-computation for mobile communications. 76-84 - Narn-Yih Lee, Chien-Nan Wu:
Improved authentication key exchange protocol without using one-way hash function. 85-92 - Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A server assisted authentication protocol for detecting error vectors. 93-96
Volume 38, Number 3, July 2004
- René Serral, Marisa Gil:
A Linux networking study. 1-11 - Yibei Ling, Wai Chen:
Measuring cache freshness by additive age. 12-17 - Zhou Xu, Xianliang Lu, Hou Mengshu:
DCFS: distributed cooperative fault-tolerance storage mechanism. 18-25 - Zhou Xu, Xianliang Lu, Hou Mengshu, Wu Jin:
A dynamic distributed replica management mechanism based on accessing frequency detecting. 26-34 - Bi-Hui Chen:
Improvement of authenaticated multiple-key agreement protocol. 35-41 - Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang:
New application of reliable agreement: underlying an unsecured business environment. 42-57 - Tian-Fu Lee, Tzonelih Hwang:
Improved conference key distribution protocol based on a symmetric balanced incomplete block design. 58-64 - Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao:
An improvement on a deniable authentication protocol. 65-74 - Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee:
A key authentication scheme with non-repudiation. 75-78 - Ya-Fen Chang, Chin-Chen Chang:
A secure and efficient strong-password authentication protocol. 79-90 - Chou Chen Yang, Ren-Chiun Wang:
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. 91-96
Volume 38, Number 4, October 2004
- Tim Leschke:
Achieving speed and flexibility by separating management from protection: embracing the Exokernel operating system. 5-19 - Nicolas Bouillot, Eric Gressier-Soudan:
Consistency models for distributed interactive multimedia applications. 20-32 - Mordechai Geva, Yair Wiseman:
A common framework for inter-process communication on a cluster. 33-44 - Yuanbo Guo, Jianfeng Ma:
An intrusion-tolerant authorization and authentication scheme in distributed environments. 45-51 - Chin-Chen Chang, Iuon-Chang Lin:
An improvement of delegated multisignature scheme with document decomposition. 52-57 - Chin-Chen Chang, Yeu-Pong Lai:
A convertible group signature scheme. 58-65 - Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang:
Cryptanalysis of an efficient secure group signature scheme. 66-69 - Narn-Yih Lee, Ming-Feng Lee:
Comments on multiparty key exchange scheme. 70-73 - Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu:
A simple password authentication using a polynomial. 74-79 - Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times. 80-90 - Chin-Chen Chang, Iuon-Chang Lin:
Remarks on fingerprint-based remote user authentication scheme using smart cards. 91-96
Volume 38, Number 5, October 2004
- Shubu Mukherjee, Kathryn S. McKinley:
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2004, Boston, MA, USA, October 7-13, 2004. ACM 2004, ISBN 1-58113-804-0 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.