


default search action
Operating Systems Review, Volume 38, 2004
Volume 38, Number 1, January 2004
- Winfried E. Kühnhauser:

Root Kits: an operating systems viewpoint. 12-23 - Sung-Woon Lee, Hyun-Sung Kim

, Kee-Young Yoo:
Cryptanalysis of a user authentication scheme using hash functions. 24-28 - Wei-Chi Ku:

A hash-based strong-password authentication scheme without using smart cards. 29-34 - Yuqing Zhang, Xiuying Liu:

An approach to the formal verification of the three-principal cryptographic protocols. 35-42 - Bu-Sung Lee, Wing-Keong Woo, Chai Kiat Yeo

, Teck Meng Lim, Bee-Hwa Lim, Yuxiong He, Jie Song:
Secure communications between bandwidth brokers. 43-57 - B. Gupta, Z. Liu, Z. Liang:

On designing direct dependency: based fast recovery algorithms for distributed systems. 58-73 - Mahfoud Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer:

Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. 74-89 - Qingsong Wei, Bo Chen, Xianliang Lu, Liyong Ren, Xu Zhou:

The research of the distributed stripped storage spatial model. 90-96
Volume 38, Number 2, April 2004
- Jeanna Neefe Matthews

:
The case for repeated research in operating systems. 5-7 - Melekam Tsegaye, Richard Foss:

A comparison of the Linux and Windows device driver architectures. 8-33 - Yuqing Zhang, Xiuying Liu:

Running-mode analysis of the Security Socket Layer protocol. 34-40 - Shu-Ching Wang, Kuo-Qin Yan:

Revisiting fault diagnosis agreement in a new territory. 41-61 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

A secure user authentication scheme using hash functions. 62-68 - Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo:

A security scheme for protecting security policies in firewall. 69-72 - Michael Scott:

Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. 73-75 - Min-Hui Lin

, Chin-Chen Chang:
A secure one-time password authentication scheme with low-computation for mobile communications. 76-84 - Narn-Yih Lee, Chien-Nan Wu:

Improved authentication key exchange protocol without using one-way hash function. 85-92 - Cheng-Chi Lee

, Min-Shiang Hwang, I-En Liao:
A server assisted authentication protocol for detecting error vectors. 93-96
Volume 38, Number 3, July 2004
- René Serral, Marisa Gil

:
A Linux networking study. 1-11 - Yibei Ling, Wai Chen:

Measuring cache freshness by additive age. 12-17 - Zhou Xu, Xianliang Lu, Hou Mengshu:

DCFS: distributed cooperative fault-tolerance storage mechanism. 18-25 - Zhou Xu, Xianliang Lu, Hou Mengshu, Wu Jin:

A dynamic distributed replica management mechanism based on accessing frequency detecting. 26-34 - Bi-Hui Chen:

Improvement of authenaticated multiple-key agreement protocol. 35-41 - Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang

:
New application of reliable agreement: underlying an unsecured business environment. 42-57 - Tian-Fu Lee, Tzonelih Hwang:

Improved conference key distribution protocol based on a symmetric balanced incomplete block design. 58-64 - Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao:

An improvement on a deniable authentication protocol. 65-74 - Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee

:
A key authentication scheme with non-repudiation. 75-78 - Ya-Fen Chang, Chin-Chen Chang:

A secure and efficient strong-password authentication protocol. 79-90 - Chou Chen Yang, Ren-Chiun Wang:

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. 91-96
Volume 38, Number 4, October 2004
- Tim Leschke:

Achieving speed and flexibility by separating management from protection: embracing the Exokernel operating system. 5-19 - Nicolas Bouillot, Eric Gressier-Soudan:

Consistency models for distributed interactive multimedia applications. 20-32 - Mordechai Geva, Yair Wiseman:

A common framework for inter-process communication on a cluster. 33-44 - Yuanbo Guo, Jianfeng Ma:

An intrusion-tolerant authorization and authentication scheme in distributed environments. 45-51 - Chin-Chen Chang, Iuon-Chang Lin:

An improvement of delegated multisignature scheme with document decomposition. 52-57 - Chin-Chen Chang, Yeu-Pong Lai:

A convertible group signature scheme. 58-65 - Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang:

Cryptanalysis of an efficient secure group signature scheme. 66-69 - Narn-Yih Lee, Ming-Feng Lee:

Comments on multiparty key exchange scheme. 70-73 - Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu

:
A simple password authentication using a polynomial. 74-79 - Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo:

A secure one-time password authentication scheme using smart cards without limiting login times. 80-90 - Chin-Chen Chang, Iuon-Chang Lin:

Remarks on fingerprint-based remote user authentication scheme using smart cards. 91-96
Volume 38, Number 5, October 2004
- Shubu Mukherjee, Kathryn S. McKinley:

Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2004, Boston, MA, USA, October 7-13, 2004. ACM 2004, ISBN 1-58113-804-0 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














