The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Roger M. Needham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder
    Grapevine: An Exercise in Distributed Computing. [Citation Graph (12, 0)][DBLP]
    Commun. ACM, 1982, v:25, n:4, pp:260-274 [Journal]
  2. Roger M. Needham, Michael D. Schroeder
    Using Encryption for Authentication in Large Networks of Computers. [Citation Graph (3, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:12, pp:993-999 [Journal]
  3. Michael D. Schroeder, David K. Gifford, Roger M. Needham
    A Caching File System For a Programmer's Workstation. [Citation Graph (2, 0)][DBLP]
    SOSP, 1985, pp:25-34 [Conf]
  4. Roger M. Needham, A. J. Herbert, James G. Mitchell
    How to Connect Stable Memory to a Computer. [Citation Graph (2, 0)][DBLP]
    Operating Systems Review, 1983, v:17, n:1, pp:16- [Journal]
  5. Michael D. Schroeder, Andrew Birrell, Roger M. Needham
    Experience with Grapevine: The Growth of a Distributed System [Citation Graph (2, 0)][DBLP]
    ACM Trans. Comput. Syst., 1984, v:2, n:1, pp:3-23 [Journal]
  6. Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder
    Gravevine: An Exercise in Distributed Computing (summary). [Citation Graph (1, 0)][DBLP]
    SOSP, 1981, pp:178-179 [Conf]
  7. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf]
  8. Hugh C. Lauer, Roger M. Needham
    On the Duality of Operating System Structures. [Citation Graph (1, 0)][DBLP]
    Operating Systems Review, 1979, v:13, n:2, pp:3-19 [Journal]
  9. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:18-36 [Journal]
  10. Roger M. Needham
    Protection. [Citation Graph (0, 0)][DBLP]
    Advanced Course: Local Area Networks, 1983, pp:260-281 [Conf]
  11. Roger M. Needham
    Denial of Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:151-153 [Conf]
  12. Ross J. Anderson, Roger M. Needham
    Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:236-247 [Conf]
  13. Roger M. Needham
    What Next? Some Speculations. [Citation Graph (0, 0)][DBLP]
    Operating Systems of the 90s and Beyond, 1991, pp:220-222 [Conf]
  14. David J. Wheeler, Roger M. Needham
    TEA, a Tiny Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:363-366 [Conf]
  15. Roger M. Needham
    Capabilities and Protection. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1980, pp:45-53 [Conf]
  16. Roger M. Needham
    A Method for Using Computers in Information Classification. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1962, pp:284-287 [Conf]
  17. A. F. Parker-Rhodes, Roger M. Needham
    A reduction method for non-arithmetic data, and its application to thesauric translation. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1959, pp:321-325 [Conf]
  18. Ross J. Anderson, Roger M. Needham, Adi Shamir
    The Steganographic File System. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:73-82 [Conf]
  19. Roger M. Needham
    Design Considerations for a Processing Server. [Citation Graph (0, 0)][DBLP]
    ISCA, 1981, pp:501-504 [Conf]
  20. Roger M. Needham
    Logic and Over-Simplification. [Citation Graph (0, 0)][DBLP]
    LICS, 1998, pp:2-3 [Conf]
  21. Roger M. Needham, Akira Nakamura
    An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 1992, pp:32-39 [Conf]
  22. Jean Bacon, Ian M. Leslie, Roger M. Needham
    Distributed Computing with a Processor Bank. [Citation Graph (0, 0)][DBLP]
    Process in Distributed Operating Systems and Distributed Systems Management, 1989, pp:147-161 [Conf]
  23. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    Current work on authentication. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1986, pp:- [Conf]
  24. Roger M. Needham
    On making distributed systems that work. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1986, pp:- [Conf]
  25. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:1-13 [Conf]
  26. T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham
    Reducing Risks from Poorly Chosen Keys. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:14-18 [Conf]
  27. A. J. Herbert, Roger M. Needham
    Sequencing Computation Steps in a Network. [Citation Graph (0, 0)][DBLP]
    SOSP, 1981, pp:59-63 [Conf]
  28. Roger M. Needham
    Handling Difficult Faults in Operating Systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 1971, pp:55-57 [Conf]
  29. Roger M. Needham
    The CAP Project - An Interim Evaluation. [Citation Graph (0, 0)][DBLP]
    SOSP, 1977, pp:17-22 [Conf]
  30. Roger M. Needham
    Systems Aspects of the Cambridge Ring. [Citation Graph (0, 0)][DBLP]
    SOSP, 1979, pp:82-85 [Conf]
  31. Roger M. Needham, Andrew Birrell
    The Cap Filing System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1977, pp:11-16 [Conf]
  32. Roger M. Needham, R. D. H. Walker
    The Cambridge CAP Computer and its Protection System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1977, pp:1-10 [Conf]
  33. M. F. Richardson, Roger M. Needham
    The TRIPOS Filing Machine, a Front End to a File Server. [Citation Graph (0, 0)][DBLP]
    SOSP, 1983, pp:120-128 [Conf]
  34. Michael D. Schroeder, Andrew Birrell, Roger M. Needham
    Experience with Grapevine: The Growth of a Distributed System (Summary). [Citation Graph (0, 0)][DBLP]
    SOSP, 1983, pp:141-142 [Conf]
  35. Li Gong, Roger M. Needham, Raphael Yahalom
    Reasoning about Belief in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:234-248 [Conf]
  36. Roger M. Needham
    The Hardware Environment. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:236- [Conf]
  37. Roger M. Needham
    Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:1-4 [Conf]
  38. Roger M. Needham
    Keynote Address: Mobile Computing versus Immobile Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:1-3 [Conf]
  39. Roger M. Needham
    Keynote Address. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:2-4 [Conf]
  40. Roger M. Needham
    Back to the Beginning. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:242- [Conf]
  41. Roger M. Needham
    Keynote Address: The Changing Environment. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:1-5 [Conf]
  42. Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson
    Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:227-239 [Conf]
  43. Michael Burrows, Martín Abadi, Roger M. Needham
    Authentication: A Practical Study in Belief and Action. [Citation Graph (0, 0)][DBLP]
    TARK, 1988, pp:325-342 [Conf]
  44. David K. Gifford, Roger M. Needham, Michael D. Schroeder
    The Cedar System. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1988, v:31, n:3, pp:288-298 [Journal]
  45. Roger M. Needham
    Denail of Service: An Example. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:11, pp:42-46 [Journal]
  46. Ian M. Leslie, Roger M. Needham, John W. Burren, Graham C. Adams
    The architecture of the universe network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:2-9 [Journal]
  47. A. Gill Waters, Christopher J. Adams, Ian M. Leslie, Roger M. Needham
    The use of broadcast techniques on the universe network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:52-57 [Journal]
  48. Roger M. Needham, Maurice V. Wilkes
    Domains of Protection and the Management of Processes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1974, v:17, n:2, pp:117-120 [Journal]
  49. K. Sparck Jones, Roger M. Needham
    Automatic term classifications and retrieval. [Citation Graph (0, 0)][DBLP]
    Information Storage and Retrieval, 1968, v:4, n:2, pp:91-100 [Journal]
  50. Roger M. Needham
    Note on evaluation. [Citation Graph (0, 0)][DBLP]
    Information Storage and Retrieval, 1973, v:9, n:8, pp:474- [Journal]
  51. Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer
    Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal]
  52. Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker
    Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1991, v:9, n:8, pp:1318-1335 [Journal]
  53. Paul W. Jardetzky, Cormac J. Sreenan, Roger M. Needham
    Storage and Synchronization for Distributed Continuous Media. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1995, v:3, n:4, pp:151-161 [Journal]
  54. Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham
    A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal]
  55. Michael Burrows, Martín Abadi, Roger M. Needham
    Rejoinder to Nessett. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1990, v:24, n:2, pp:39-40 [Journal]
  56. Andrew Birrell, Roger M. Needham
    An Asynchronous Garbage Collector for the CAP Filing System. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1978, v:12, n:2, pp:31-33 [Journal]
  57. Andrew Birrell, Roger M. Needham
    Character Streams. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1978, v:12, n:3, pp:29-31 [Journal]
  58. N. H. Garnett, Roger M. Needham
    An Asynchronous Garbage Collector for the Cambridge File Server. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1980, v:14, n:4, pp:36-40 [Journal]
  59. Roger M. Needham
    Adding Capability to Conventional File Servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1979, v:13, n:1, pp:3-4 [Journal]
  60. Roger M. Needham, Michael Burrows
    Locks in Distributed Systems - Observations. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:44- [Journal]
  61. Roger M. Needham, Andrew Herbert
    Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1989, v:23, n:2, pp:3-19 [Journal]
  62. Roger M. Needham, Michael D. Schroeder
    Authentication Revisited. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1987, v:21, n:1, pp:7- [Journal]
  63. Maurice V. Wilkes, Roger M. Needham
    The Cambridge Model Distributed System. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1980, v:14, n:1, pp:21-29 [Journal]
  64. B. Landy, Roger M. Needham
    Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1971, v:1, n:2, pp:167-173 [Journal]
  65. Andrew Hopper, Roger M. Needham
    The Cambridge Fast Ring Networking System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:10, pp:1214-1223 [Journal]
  66. Martín Abadi, Roger M. Needham
    Prudent Engineering Practice for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:6-15 [Journal]
  67. Andrew Birrell, Roger M. Needham
    A Universal File Server. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1980, v:6, n:5, pp:450-453 [Journal]

Search in 0.010secs, Finished in 0.012secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002