8 | -- | 18 | Christophe Rippert. Protection in flexible operating system architectures |
19 | -- | 25 | Wei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee. Weaknesses of Lee-Li-Hwang s hash-based password authentication scheme |
26 | -- | 31 | Wei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen. Two simple attacks on Lin-Shen-Hwang s strong-password authentication protocol |
32 | -- | 41 | Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo. ID-based password authentication scheme using smart cards and fingerprints |
42 | -- | 47 | Min-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu. An authentication scheme for mobile satellite communication systems |
48 | -- | 62 | Ruben Pinilla, Marisa Gil. ULT: a Java threads model for platform independent execution |
63 | -- | 69 | Liyong Ren, Bo Chen, Jing Wu. A novel packet-pair-based inferring bandwidth congestion control mechanism for layered multicast |
70 | -- | 89 | Shu-Chin Wang, Kuo-Qin Yan, Chien-Fu Cheng. Reaching agreement on an unknown network with partial graphic information |
90 | -- | 96 | Carlos Baquero, Nuno Lopes. Towards peer-to-peer content indexing |