Journal: Operating Systems Review

Volume 38, Issue 2

5 -- 7Jeanna Neefe Matthews. The case for repeated research in operating systems
8 -- 33Melekam Tsegaye, Richard Foss. A comparison of the Linux and Windows device driver architectures
34 -- 40. Running-mode analysis of the Security Socket Layer protocol
41 -- 61Shu-Ching Wang, Kuo-Qin Yan. Revisiting fault diagnosis agreement in a new territory
62 -- 68Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. A secure user authentication scheme using hash functions
69 -- 72Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo. A security scheme for protecting security policies in firewall
73 -- 75Michael Scott. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
76 -- 84Min-Hui Lin, Chin-Chen Chang. A secure one-time password authentication scheme with low-computation for mobile communications
85 -- 92Narn-Yih Lee, Chien-Nan Wu. Improved authentication key exchange protocol without using one-way hash function
93 -- 96Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao. A server assisted authentication protocol for detecting error vectors