Search the dblp DataBase
Roger M. Needham :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Andrew Birrell , Roy Levin , Roger M. Needham , Michael D. Schroeder Grapevine: An Exercise in Distributed Computing. [Citation Graph (12, 0)][DBLP ] Commun. ACM, 1982, v:25, n:4, pp:260-274 [Journal ] Roger M. Needham , Michael D. Schroeder Using Encryption for Authentication in Large Networks of Computers. [Citation Graph (3, 0)][DBLP ] Commun. ACM, 1978, v:21, n:12, pp:993-999 [Journal ] Michael D. Schroeder , David K. Gifford , Roger M. Needham A Caching File System For a Programmer's Workstation. [Citation Graph (2, 0)][DBLP ] SOSP, 1985, pp:25-34 [Conf ] Roger M. Needham , A. J. Herbert , James G. Mitchell How to Connect Stable Memory to a Computer. [Citation Graph (2, 0)][DBLP ] Operating Systems Review, 1983, v:17, n:1, pp:16- [Journal ] Michael D. Schroeder , Andrew Birrell , Roger M. Needham Experience with Grapevine: The Growth of a Distributed System [Citation Graph (2, 0)][DBLP ] ACM Trans. Comput. Syst., 1984, v:2, n:1, pp:3-23 [Journal ] Andrew Birrell , Roy Levin , Roger M. Needham , Michael D. Schroeder Gravevine: An Exercise in Distributed Computing (summary). [Citation Graph (1, 0)][DBLP ] SOSP, 1981, pp:178-179 [Conf ] Andrew Birrell , Butler W. Lampson , Roger M. Needham , Michael D. Schroeder A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf ] Hugh C. Lauer , Roger M. Needham On the Duality of Operating System Structures. [Citation Graph (1, 0)][DBLP ] Operating Systems Review, 1979, v:13, n:2, pp:3-19 [Journal ] Michael Burrows , Martín Abadi , Roger M. Needham A Logic of Authentication. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:18-36 [Journal ] Roger M. Needham Protection. [Citation Graph (0, 0)][DBLP ] Advanced Course: Local Area Networks, 1983, pp:260-281 [Conf ] Roger M. Needham Denial of Service. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:151-153 [Conf ] Ross J. Anderson , Roger M. Needham Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:236-247 [Conf ] Roger M. Needham What Next? Some Speculations. [Citation Graph (0, 0)][DBLP ] Operating Systems of the 90s and Beyond, 1991, pp:220-222 [Conf ] David J. Wheeler , Roger M. Needham TEA, a Tiny Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:363-366 [Conf ] Roger M. Needham Capabilities and Protection. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1980, pp:45-53 [Conf ] Roger M. Needham A Method for Using Computers in Information Classification. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1962, pp:284-287 [Conf ] A. F. Parker-Rhodes , Roger M. Needham A reduction method for non-arithmetic data, and its application to thesauric translation. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1959, pp:321-325 [Conf ] Ross J. Anderson , Roger M. Needham , Adi Shamir The Steganographic File System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:73-82 [Conf ] Roger M. Needham Design Considerations for a Processing Server. [Citation Graph (0, 0)][DBLP ] ISCA, 1981, pp:501-504 [Conf ] Roger M. Needham Logic and Over-Simplification. [Citation Graph (0, 0)][DBLP ] LICS, 1998, pp:2-3 [Conf ] Roger M. Needham , Akira Nakamura An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? [Citation Graph (0, 0)][DBLP ] NOSSDAV, 1992, pp:32-39 [Conf ] Jean Bacon , Ian M. Leslie , Roger M. Needham Distributed Computing with a Processor Bank. [Citation Graph (0, 0)][DBLP ] Process in Distributed Operating Systems and Distributed Systems Management, 1989, pp:147-161 [Conf ] Andrew Birrell , Butler W. Lampson , Roger M. Needham , Michael D. Schroeder Current work on authentication. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1986, pp:- [Conf ] Roger M. Needham On making distributed systems that work. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1986, pp:- [Conf ] Michael Burrows , Martín Abadi , Roger M. Needham A Logic of Authentication. [Citation Graph (0, 0)][DBLP ] SOSP, 1989, pp:1-13 [Conf ] T. Mark A. Lomas , Li Gong , Jerome H. Saltzer , Roger M. Needham Reducing Risks from Poorly Chosen Keys. [Citation Graph (0, 0)][DBLP ] SOSP, 1989, pp:14-18 [Conf ] A. J. Herbert , Roger M. Needham Sequencing Computation Steps in a Network. [Citation Graph (0, 0)][DBLP ] SOSP, 1981, pp:59-63 [Conf ] Roger M. Needham Handling Difficult Faults in Operating Systems. [Citation Graph (0, 0)][DBLP ] SOSP, 1971, pp:55-57 [Conf ] Roger M. Needham The CAP Project - An Interim Evaluation. [Citation Graph (0, 0)][DBLP ] SOSP, 1977, pp:17-22 [Conf ] Roger M. Needham Systems Aspects of the Cambridge Ring. [Citation Graph (0, 0)][DBLP ] SOSP, 1979, pp:82-85 [Conf ] Roger M. Needham , Andrew Birrell The Cap Filing System. [Citation Graph (0, 0)][DBLP ] SOSP, 1977, pp:11-16 [Conf ] Roger M. Needham , R. D. H. Walker The Cambridge CAP Computer and its Protection System. [Citation Graph (0, 0)][DBLP ] SOSP, 1977, pp:1-10 [Conf ] M. F. Richardson , Roger M. Needham The TRIPOS Filing Machine, a Front End to a File Server. [Citation Graph (0, 0)][DBLP ] SOSP, 1983, pp:120-128 [Conf ] Michael D. Schroeder , Andrew Birrell , Roger M. Needham Experience with Grapevine: The Growth of a Distributed System (Summary). [Citation Graph (0, 0)][DBLP ] SOSP, 1983, pp:141-142 [Conf ] Li Gong , Roger M. Needham , Raphael Yahalom Reasoning about Belief in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:234-248 [Conf ] Roger M. Needham The Hardware Environment. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:236- [Conf ] Roger M. Needham Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:1-4 [Conf ] Roger M. Needham Keynote Address: Mobile Computing versus Immobile Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:1-3 [Conf ] Roger M. Needham Keynote Address. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:2-4 [Conf ] Roger M. Needham Back to the Beginning. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:242- [Conf ] Roger M. Needham Keynote Address: The Changing Environment. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:1-5 [Conf ] Roger M. Needham , E. Stewart Lee , Joan Feigenbaum , Virgil D. Gligor , Bruce Christianson Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:227-239 [Conf ] Michael Burrows , Martín Abadi , Roger M. Needham Authentication: A Practical Study in Belief and Action. [Citation Graph (0, 0)][DBLP ] TARK, 1988, pp:325-342 [Conf ] David K. Gifford , Roger M. Needham , Michael D. Schroeder The Cedar System. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1988, v:31, n:3, pp:288-298 [Journal ] Roger M. Needham Denail of Service: An Example. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:11, pp:42-46 [Journal ] Ian M. Leslie , Roger M. Needham , John W. Burren , Graham C. Adams The architecture of the universe network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 1984, v:14, n:2, pp:2-9 [Journal ] A. Gill Waters , Christopher J. Adams , Ian M. Leslie , Roger M. Needham The use of broadcast techniques on the universe network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 1984, v:14, n:2, pp:52-57 [Journal ] Roger M. Needham , Maurice V. Wilkes Domains of Protection and the Management of Processes. [Citation Graph (0, 0)][DBLP ] Comput. J., 1974, v:17, n:2, pp:117-120 [Journal ] K. Sparck Jones , Roger M. Needham Automatic term classifications and retrieval. [Citation Graph (0, 0)][DBLP ] Information Storage and Retrieval, 1968, v:4, n:2, pp:91-100 [Journal ] Roger M. Needham Note on evaluation. [Citation Graph (0, 0)][DBLP ] Information Storage and Retrieval, 1973, v:9, n:8, pp:474- [Journal ] Li Gong , T. Mark A. Lomas , Roger M. Needham , Jerome H. Saltzer Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal ] Michael D. Schroeder , Andrew Birrell , Michael Burrows , Hal Murray , Roger M. Needham , Thomas L. Rodeheffer , Edwin H. Satterthwaite , Charles P. Thacker Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1991, v:9, n:8, pp:1318-1335 [Journal ] Paul W. Jardetzky , Cormac J. Sreenan , Roger M. Needham Storage and Synchronization for Distributed Continuous Media. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 1995, v:3, n:4, pp:151-161 [Journal ] Ross J. Anderson , Francesco Bergadano , Bruno Crispo , Jong-Hyeon Lee , Charalampos Manifavas , Roger M. Needham A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal ] Michael Burrows , Martín Abadi , Roger M. Needham Rejoinder to Nessett. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1990, v:24, n:2, pp:39-40 [Journal ] Andrew Birrell , Roger M. Needham An Asynchronous Garbage Collector for the CAP Filing System. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1978, v:12, n:2, pp:31-33 [Journal ] Andrew Birrell , Roger M. Needham Character Streams. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1978, v:12, n:3, pp:29-31 [Journal ] N. H. Garnett , Roger M. Needham An Asynchronous Garbage Collector for the Cambridge File Server. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1980, v:14, n:4, pp:36-40 [Journal ] Roger M. Needham Adding Capability to Conventional File Servers. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1979, v:13, n:1, pp:3-4 [Journal ] Roger M. Needham , Michael Burrows Locks in Distributed Systems - Observations. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1988, v:22, n:3, pp:44- [Journal ] Roger M. Needham , Andrew Herbert Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1989, v:23, n:2, pp:3-19 [Journal ] Roger M. Needham , Michael D. Schroeder Authentication Revisited. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1987, v:21, n:1, pp:7- [Journal ] Maurice V. Wilkes , Roger M. Needham The Cambridge Model Distributed System. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1980, v:14, n:1, pp:21-29 [Journal ] B. Landy , Roger M. Needham Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1971, v:1, n:2, pp:167-173 [Journal ] Andrew Hopper , Roger M. Needham The Cambridge Fast Ring Networking System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:10, pp:1214-1223 [Journal ] Martín Abadi , Roger M. Needham Prudent Engineering Practice for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:6-15 [Journal ] Andrew Birrell , Roger M. Needham A Universal File Server. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1980, v:6, n:5, pp:450-453 [Journal ] Search in 0.010secs, Finished in 0.012secs