Journal: Operating Systems Review

Volume 38, Issue 4

5 -- 19Tim Leschke. Achieving speed and flexibility by separating management from protection: embracing the Exokernel operating system
20 -- 32Nicolas Bouillot, Eric Gressier-Soudan. Consistency models for distributed interactive multimedia applications
33 -- 44Mordechai Geva, Yair Wiseman. A common framework for inter-process communication on a cluster
45 -- 51Yuanbo Guo, Jianfeng Ma. An intrusion-tolerant authorization and authentication scheme in distributed environments
52 -- 57Chin-Chen Chang, Iuon-Chang Lin. An improvement of delegated multisignature scheme with document decomposition
58 -- 65Chin-Chen Chang, Yeu-Pong Lai. A convertible group signature scheme
66 -- 69Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang. Cryptanalysis of an efficient secure group signature scheme
70 -- 73Narn-Yih Lee, Ming-Feng Lee. Comments on multiparty key exchange scheme
74 -- 79Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu. A simple password authentication using a polynomial
80 -- 90Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo. A secure one-time password authentication scheme using smart cards without limiting login times
91 -- 96Chin-Chen Chang, Iuon-Chang Lin. Remarks on fingerprint-based remote user authentication scheme using smart cards

Volume 38, Issue 3

1 -- 11René Serral, Marisa Gil. A Linux networking study
12 -- 17Yibei Ling, Wai Chen. Measuring cache freshness by additive age
18 -- 25Zhou Xu, Xianliang Lu, Hou Mengshu. DCFS: distributed cooperative fault-tolerance storage mechanism
26 -- 34Zhou Xu, Xianliang Lu, Hou Mengshu, Wu Jin. A dynamic distributed replica management mechanism based on accessing frequency detecting
35 -- 41Bi-Hui Chen. Improvement of authenaticated multiple-key agreement protocol
42 -- 57Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang. New application of reliable agreement: underlying an unsecured business environment
58 -- 64Tian-Fu Lee, Tzonelih Hwang. Improved conference key distribution protocol based on a symmetric balanced incomplete block design
65 -- 74Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao. An improvement on a deniable authentication protocol
75 -- 78Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee. A key authentication scheme with non-repudiation
79 -- 90Ya-Fen Chang, Chin-Chen Chang. A secure and efficient strong-password authentication protocol
91 -- 96Chou Chen Yang, Ren-Chiun Wang. An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards

Volume 38, Issue 2

5 -- 7Jeanna Neefe Matthews. The case for repeated research in operating systems
8 -- 33Melekam Tsegaye, Richard Foss. A comparison of the Linux and Windows device driver architectures
34 -- 40. Running-mode analysis of the Security Socket Layer protocol
41 -- 61Shu-Ching Wang, Kuo-Qin Yan. Revisiting fault diagnosis agreement in a new territory
62 -- 68Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. A secure user authentication scheme using hash functions
69 -- 72Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo. A security scheme for protecting security policies in firewall
73 -- 75Michael Scott. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
76 -- 84Min-Hui Lin, Chin-Chen Chang. A secure one-time password authentication scheme with low-computation for mobile communications
85 -- 92Narn-Yih Lee, Chien-Nan Wu. Improved authentication key exchange protocol without using one-way hash function
93 -- 96Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao. A server assisted authentication protocol for detecting error vectors

Volume 38, Issue 1

12 -- 23Winfried E. Kühnhauser. Root Kits: an operating systems viewpoint
24 -- 28Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. Cryptanalysis of a user authentication scheme using hash functions
29 -- 34Wei-Chi Ku. A hash-based strong-password authentication scheme without using smart cards
35 -- 42Yuqing Zhang, Xiuying Liu. An approach to the formal verification of the three-principal cryptographic protocols
43 -- 57Bu-Sung Lee, Wing-Keong Woo, Chai Kiat Yeo, Teck Meng Lim, Bee-Hwa Lim, Yuxiong He, Jie Song. Secure communications between bandwidth brokers
58 -- 73B. Gupta, Z. Liu, Z. Liang. On designing direct dependency: based fast recovery algorithms for distributed systems
74 -- 89M. Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer. Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview
90 -- 96Qingsong Wei, Bo Chen, Xianliang Lu, Liyong Ren, Xu Zhou. The research of the distributed stripped storage spatial model