|
Search the dblp DataBase
Edward Wobber:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew Birrell, Greg Nelson, Susan S. Owicki, Edward Wobber
Network Objects. [Citation Graph (1, 0)][DBLP] SOSP, 1993, pp:217-230 [Conf]
- Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
Secure Network Objects. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:395-412 [Conf]
- Andrew Birrell, Michael B. Jones, Edward Wobber
A Simple and Efficient Implementation for Small Databases. [Citation Graph (0, 0)][DBLP] SOSP, 1987, pp:149-154 [Conf]
- Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP] SOSP, 1991, pp:165-182 [Conf]
- Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP] SOSP, 1993, pp:256-269 [Conf]
- Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
Secure Network Objects. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:211-221 [Conf]
- Francis J. Prusker, Edward Wobber
The Siphon: Managing Distant Replicated Repositories. [Citation Graph (0, 0)][DBLP] Workshop on the Management of Replicated Data, 1990, pp:44-47 [Conf]
- Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber
Secure Web Tunneling. [Citation Graph (0, 0)][DBLP] Computer Networks, 1998, v:30, n:1-7, pp:531-539 [Journal]
- Kenneth F. Alden, Edward Wobber
The AltaVista Tunnel Using the Internet to Extend Corporate Networks. [Citation Graph (0, 0)][DBLP] Digital Technical Journal, 1997, v:9, n:2, pp:- [Journal]
- Andrew Birrell, Greg Nelson, Susan S. Owicki, Edward Wobber
Network Objects [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1995, v:25, n:S4, pp:0-0 [Journal]
- Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal]
- Edward Wobber, Martín Abadi, Michael Burrows
Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:3-32 [Journal]
Search in 0.002secs, Finished in 0.002secs
|