5 | -- | 7 | Jeanna Neefe Matthews. The case for repeated research in operating systems |
8 | -- | 33 | Melekam Tsegaye, Richard Foss. A comparison of the Linux and Windows device driver architectures |
34 | -- | 40 | . Running-mode analysis of the Security Socket Layer protocol |
41 | -- | 61 | Shu-Ching Wang, Kuo-Qin Yan. Revisiting fault diagnosis agreement in a new territory |
62 | -- | 68 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. A secure user authentication scheme using hash functions |
69 | -- | 72 | Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo. A security scheme for protecting security policies in firewall |
73 | -- | 75 | Michael Scott. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints |
76 | -- | 84 | Min-Hui Lin, Chin-Chen Chang. A secure one-time password authentication scheme with low-computation for mobile communications |
85 | -- | 92 | Narn-Yih Lee, Chien-Nan Wu. Improved authentication key exchange protocol without using one-way hash function |
93 | -- | 96 | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao. A server assisted authentication protocol for detecting error vectors |