dblp.uni-trier.dewww.uni-trier.de

Roger M. Needham Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2002
68EERoger M. Needham: Keynote Address. Security Protocols Workshop 2002: 2-4
67EERoger M. Needham: Back to the Beginning. Security Protocols Workshop 2002: 242
2001
66EERoger M. Needham: Keynote Address: Mobile Computing versus Immobile Security. Security Protocols Workshop 2001: 1-3
2000
65EERoger M. Needham: Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). Security Protocols Workshop 2000: 1-4
1999
64EERoger M. Needham: The Hardware Environment. IEEE Symposium on Security and Privacy 1999: 236
63 Roger M. Needham: Keynote Address: The Changing Environment. Security Protocols Workshop 1999: 1-5
1998
62EERoss J. Anderson, Roger M. Needham, Adi Shamir: The Steganographic File System. Information Hiding 1998: 73-82
61 Roger M. Needham: Logic and Over-Simplification. LICS 1998: 2-3
60EERoger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239
59 Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998)
1996
58EEMartín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996)
1995
57EERoss J. Anderson, Roger M. Needham: Robustness Principles for Public Key Protocols. CRYPTO 1995: 236-247
56EERoss J. Anderson, Roger M. Needham: Programming Satan's Computer. Computer Science Today 1995: 426-440
55 Paul W. Jardetzky, Cormac J. Sreenan, Roger M. Needham: Storage and Synchronization for Distributed Continuous Media. Multimedia Syst. 3(4): 151-161 (1995)
1994
54 David J. Wheeler, Roger M. Needham: TEA, a Tiny Encryption Algorithm. FSE 1994: 363-366
53 Roger M. Needham: Denail of Service: An Example. Commun. ACM 37(11): 42-46 (1994)
1993
52EERoger M. Needham: Denial of Service. ACM Conference on Computer and Communications Security 1993: 151-153
51 Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993)
1992
50 Roger M. Needham, Akira Nakamura: An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? NOSSDAV 1992: 32-39
1991
49 Roger M. Needham: What Next? Some Speculations. Operating Systems of the 90s and Beyond 1991: 220-222
48 Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker: Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. IEEE Journal on Selected Areas in Communications 9(8): 1318-1335 (1991)
1990
47 Li Gong, Roger M. Needham, Raphael Yahalom: Reasoning about Belief in Cryptographic Protocols. IEEE Symposium on Security and Privacy 1990: 234-248
46EEMichael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990)
45 Michael Burrows, Martín Abadi, Roger M. Needham: Rejoinder to Nessett. Operating Systems Review 24(2): 39-40 (1990)
1989
44EEJean Bacon, Ian M. Leslie, Roger M. Needham: Distributed Computing with a Processor Bank. Process in Distributed Operating Systems and Distributed Systems Management 1989: 147-161
43 Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. SOSP 1989: 1-13
42 T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham: Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18
41 Roger M. Needham, Andrew Herbert: Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England. Operating Systems Review 23(2): 3-19 (1989)
1988
40 Michael Burrows, Martín Abadi, Roger M. Needham: Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342
39 David K. Gifford, Roger M. Needham, Michael D. Schroeder: The Cedar System. Commun. ACM 31(3): 288-298 (1988)
38 Andrew Hopper, Roger M. Needham: The Cambridge Fast Ring Networking System. IEEE Trans. Computers 37(10): 1214-1223 (1988)
37 Roger M. Needham, Michael Burrows: Locks in Distributed Systems - Observations. Operating Systems Review 22(3): 44 (1988)
1987
36 Roger M. Needham, Michael D. Schroeder: Authentication Revisited. Operating Systems Review 21(1): 7 (1987)
1986
35EEAndrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: Current work on authentication. ACM SIGOPS European Workshop 1986
34EERoger M. Needham: On making distributed systems that work. ACM SIGOPS European Workshop 1986
33 Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy 1986: 223-230
1985
32 Michael D. Schroeder, David K. Gifford, Roger M. Needham: A Caching File System For a Programmer's Workstation. SOSP 1985: 25-34
1984
31EEMichael D. Schroeder, Andrew Birrell, Roger M. Needham: Experience with Grapevine: The Growth of a Distributed System ACM Trans. Comput. Syst. 2(1): 3-23 (1984)
30EEIan M. Leslie, Roger M. Needham, John W. Burren, Graham C. Adams: The architecture of the universe network. Computer Communication Review 14(2): 2-9 (1984)
29EEA. Gill Waters, Christopher J. Adams, Ian M. Leslie, Roger M. Needham: The use of broadcast techniques on the universe network. Computer Communication Review 14(2): 52-57 (1984)
1983
28 Roger M. Needham: Protection. Advanced Course: Local Area Networks 1983: 260-281
27 M. F. Richardson, Roger M. Needham: The TRIPOS Filing Machine, a Front End to a File Server. SOSP 1983: 120-128
26 Michael D. Schroeder, Andrew Birrell, Roger M. Needham: Experience with Grapevine: The Growth of a Distributed System (Summary). SOSP 1983: 141-142
25 Roger M. Needham, A. J. Herbert, James G. Mitchell: How to Connect Stable Memory to a Computer. Operating Systems Review 17(1): 16 (1983)
1982
24 Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder: Grapevine: An Exercise in Distributed Computing. Commun. ACM 25(4): 260-274 (1982)
1981
23 Roger M. Needham: Design Considerations for a Processing Server. ISCA 1981: 501-504
22 Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder: Gravevine: An Exercise in Distributed Computing (summary). SOSP 1981: 178-179
21 A. J. Herbert, Roger M. Needham: Sequencing Computation Steps in a Network. SOSP 1981: 59-63
1980
20 Roger M. Needham: Capabilities and Protection. GI Jahrestagung 1980: 45-53
19 Andrew Birrell, Roger M. Needham: A Universal File Server. IEEE Trans. Software Eng. 6(5): 450-453 (1980)
18 Maurice V. Wilkes, Roger M. Needham: The Cambridge Model Distributed System. Operating Systems Review 14(1): 21-29 (1980)
17 N. H. Garnett, Roger M. Needham: An Asynchronous Garbage Collector for the Cambridge File Server. Operating Systems Review 14(4): 36-40 (1980)
1979
16 Roger M. Needham: Systems Aspects of the Cambridge Ring. SOSP 1979: 82-85
15 Roger M. Needham: Adding Capability to Conventional File Servers. Operating Systems Review 13(1): 3-4 (1979)
14 Hugh C. Lauer, Roger M. Needham: On the Duality of Operating System Structures. Operating Systems Review 13(2): 3-19 (1979)
1978
13 Roger M. Needham, Michael D. Schroeder: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21(12): 993-999 (1978)
12 Andrew Birrell, Roger M. Needham: An Asynchronous Garbage Collector for the CAP Filing System. Operating Systems Review 12(2): 31-33 (1978)
11 Andrew Birrell, Roger M. Needham: Character Streams. Operating Systems Review 12(3): 29-31 (1978)
1977
10 Roger M. Needham, R. D. H. Walker: The Cambridge CAP Computer and its Protection System. SOSP 1977: 1-10
9 Roger M. Needham, Andrew Birrell: The Cap Filing System. SOSP 1977: 11-16
8 Roger M. Needham: The CAP Project - An Interim Evaluation. SOSP 1977: 17-22
1974
7 Roger M. Needham, Maurice V. Wilkes: Domains of Protection and the Management of Processes. Comput. J. 17(2): 117-120 (1974)
1973
6EERoger M. Needham: Note on evaluation. Information Storage and Retrieval 9(8): 474 (1973)
1971
5 Roger M. Needham: Handling Difficult Faults in Operating Systems. SOSP 1971: 55-57
4 B. Landy, Roger M. Needham: Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System. Softw., Pract. Exper. 1(2): 167-173 (1971)
1968
3EEKaren Sparck Jones, Roger M. Needham: Automatic term classifications and retrieval. Information Storage and Retrieval 4(2): 91-100 (1968)
1962
2 Roger M. Needham: A Method for Using Computers in Information Classification. IFIP Congress 1962: 284-287
1959
1 A. F. Parker-Rhodes, Roger M. Needham: A reduction method for non-arithmetic data, and its application to thesauric translation. IFIP Congress 1959: 321-325

Coauthor Index

1Martín Abadi [40] [43] [45] [46] [58]
2Christopher J. Adams [29]
3Graham C. Adams [30]
4Ross J. Anderson [56] [57] [59] [62]
5Jean Bacon [44]
6Francesco Bergadano [59]
7Andrew Birrell [9] [11] [12] [19] [22] [24] [26] [31] [33] [35] [48]
8John W. Burren [30]
9Michael Burrows [37] [40] [43] [45] [46] [48]
10Bruce Christianson [60]
11Bruno Crispo [59]
12Joan Feigenbaum [60]
13N. H. Garnett [17]
14David K. Gifford [32] [39]
15Virgil D. Gligor [60]
16Li Gong [42] [47] [51]
17A. J. Herbert [21] [25]
18Andrew Herbert [41]
19Andy Hopper (Andrew Hopper) [38]
20Paul W. Jardetzky [55]
21Karen Sparck Jones (Karen Spärck Jones) [3]
22Butler W. Lampson [33] [35]
23B. Landy [4]
24Hugh C. Lauer [14]
25E. Stewart Lee [60]
26Jong-Hyeon Lee [59]
27Ian M. Leslie [29] [30] [44]
28Roy Levin [22] [24]
29T. Mark A. Lomas [42] [51]
30Charalampos Manifavas [59]
31James G. Mitchell [25]
32Hal Murray [48]
33Akira Nakamura [50]
34A. F. Parker-Rhodes [1]
35M. F. Richardson [27]
36Thomas L. Rodeheffer (Tom Rodeheffer) [48]
37Jerome H. Saltzer [42] [51]
38Edwin H. Satterthwaite [48]
39Michael D. Schroeder [13] [22] [24] [26] [31] [32] [33] [35] [36] [39] [48]
40Adi Shamir [62]
41Cormac J. Sreenan [55]
42Charles P. Thacker [48]
43R. D. H. Walker [10]
44A. Gill Waters [29]
45David J. Wheeler [54]
46Maurice V. Wilkes [7] [18]
47Raphael Yahalom [47]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)