2002 | ||
---|---|---|
68 | EE | Roger M. Needham: Keynote Address. Security Protocols Workshop 2002: 2-4 |
67 | EE | Roger M. Needham: Back to the Beginning. Security Protocols Workshop 2002: 242 |
2001 | ||
66 | EE | Roger M. Needham: Keynote Address: Mobile Computing versus Immobile Security. Security Protocols Workshop 2001: 1-3 |
2000 | ||
65 | EE | Roger M. Needham: Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). Security Protocols Workshop 2000: 1-4 |
1999 | ||
64 | EE | Roger M. Needham: The Hardware Environment. IEEE Symposium on Security and Privacy 1999: 236 |
63 | Roger M. Needham: Keynote Address: The Changing Environment. Security Protocols Workshop 1999: 1-5 | |
1998 | ||
62 | EE | Ross J. Anderson, Roger M. Needham, Adi Shamir: The Steganographic File System. Information Hiding 1998: 73-82 |
61 | Roger M. Needham: Logic and Over-Simplification. LICS 1998: 2-3 | |
60 | EE | Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 |
59 | Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998) | |
1996 | ||
58 | EE | Martín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
1995 | ||
57 | EE | Ross J. Anderson, Roger M. Needham: Robustness Principles for Public Key Protocols. CRYPTO 1995: 236-247 |
56 | Ross J. Anderson, Roger M. Needham: Programming Satan's Computer. Computer Science Today 1995: 426-440 | |
55 | Paul W. Jardetzky, Cormac J. Sreenan, Roger M. Needham: Storage and Synchronization for Distributed Continuous Media. Multimedia Syst. 3(4): 151-161 (1995) | |
1994 | ||
54 | David J. Wheeler, Roger M. Needham: TEA, a Tiny Encryption Algorithm. FSE 1994: 363-366 | |
53 | Roger M. Needham: Denail of Service: An Example. Commun. ACM 37(11): 42-46 (1994) | |
1993 | ||
52 | EE | Roger M. Needham: Denial of Service. ACM Conference on Computer and Communications Security 1993: 151-153 |
51 | Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993) | |
1992 | ||
50 | Roger M. Needham, Akira Nakamura: An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? NOSSDAV 1992: 32-39 | |
1991 | ||
49 | Roger M. Needham: What Next? Some Speculations. Operating Systems of the 90s and Beyond 1991: 220-222 | |
48 | Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker: Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. IEEE Journal on Selected Areas in Communications 9(8): 1318-1335 (1991) | |
1990 | ||
47 | Li Gong, Roger M. Needham, Raphael Yahalom: Reasoning about Belief in Cryptographic Protocols. IEEE Symposium on Security and Privacy 1990: 234-248 | |
46 | EE | Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
45 | Michael Burrows, Martín Abadi, Roger M. Needham: Rejoinder to Nessett. Operating Systems Review 24(2): 39-40 (1990) | |
1989 | ||
44 | Jean Bacon, Ian M. Leslie, Roger M. Needham: Distributed Computing with a Processor Bank. Process in Distributed Operating Systems and Distributed Systems Management 1989: 147-161 | |
43 | Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. SOSP 1989: 1-13 | |
42 | T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham: Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18 | |
41 | Roger M. Needham, Andrew Herbert: Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England. Operating Systems Review 23(2): 3-19 (1989) | |
1988 | ||
40 | Michael Burrows, Martín Abadi, Roger M. Needham: Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342 | |
39 | David K. Gifford, Roger M. Needham, Michael D. Schroeder: The Cedar System. Commun. ACM 31(3): 288-298 (1988) | |
38 | Andrew Hopper, Roger M. Needham: The Cambridge Fast Ring Networking System. IEEE Trans. Computers 37(10): 1214-1223 (1988) | |
37 | Roger M. Needham, Michael Burrows: Locks in Distributed Systems - Observations. Operating Systems Review 22(3): 44 (1988) | |
1987 | ||
36 | Roger M. Needham, Michael D. Schroeder: Authentication Revisited. Operating Systems Review 21(1): 7 (1987) | |
1986 | ||
35 | EE | Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: Current work on authentication. ACM SIGOPS European Workshop 1986 |
34 | EE | Roger M. Needham: On making distributed systems that work. ACM SIGOPS European Workshop 1986 |
33 | Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy 1986: 223-230 | |
1985 | ||
32 | Michael D. Schroeder, David K. Gifford, Roger M. Needham: A Caching File System For a Programmer's Workstation. SOSP 1985: 25-34 | |
1984 | ||
31 | EE | Michael D. Schroeder, Andrew Birrell, Roger M. Needham: Experience with Grapevine: The Growth of a Distributed System ACM Trans. Comput. Syst. 2(1): 3-23 (1984) |
30 | EE | Ian M. Leslie, Roger M. Needham, John W. Burren, Graham C. Adams: The architecture of the universe network. Computer Communication Review 14(2): 2-9 (1984) |
29 | EE | A. Gill Waters, Christopher J. Adams, Ian M. Leslie, Roger M. Needham: The use of broadcast techniques on the universe network. Computer Communication Review 14(2): 52-57 (1984) |
1983 | ||
28 | Roger M. Needham: Protection. Advanced Course: Local Area Networks 1983: 260-281 | |
27 | M. F. Richardson, Roger M. Needham: The TRIPOS Filing Machine, a Front End to a File Server. SOSP 1983: 120-128 | |
26 | Michael D. Schroeder, Andrew Birrell, Roger M. Needham: Experience with Grapevine: The Growth of a Distributed System (Summary). SOSP 1983: 141-142 | |
25 | Roger M. Needham, A. J. Herbert, James G. Mitchell: How to Connect Stable Memory to a Computer. Operating Systems Review 17(1): 16 (1983) | |
1982 | ||
24 | Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder: Grapevine: An Exercise in Distributed Computing. Commun. ACM 25(4): 260-274 (1982) | |
1981 | ||
23 | Roger M. Needham: Design Considerations for a Processing Server. ISCA 1981: 501-504 | |
22 | Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder: Gravevine: An Exercise in Distributed Computing (summary). SOSP 1981: 178-179 | |
21 | A. J. Herbert, Roger M. Needham: Sequencing Computation Steps in a Network. SOSP 1981: 59-63 | |
1980 | ||
20 | Roger M. Needham: Capabilities and Protection. GI Jahrestagung 1980: 45-53 | |
19 | Andrew Birrell, Roger M. Needham: A Universal File Server. IEEE Trans. Software Eng. 6(5): 450-453 (1980) | |
18 | Maurice V. Wilkes, Roger M. Needham: The Cambridge Model Distributed System. Operating Systems Review 14(1): 21-29 (1980) | |
17 | N. H. Garnett, Roger M. Needham: An Asynchronous Garbage Collector for the Cambridge File Server. Operating Systems Review 14(4): 36-40 (1980) | |
1979 | ||
16 | Roger M. Needham: Systems Aspects of the Cambridge Ring. SOSP 1979: 82-85 | |
15 | Roger M. Needham: Adding Capability to Conventional File Servers. Operating Systems Review 13(1): 3-4 (1979) | |
14 | Hugh C. Lauer, Roger M. Needham: On the Duality of Operating System Structures. Operating Systems Review 13(2): 3-19 (1979) | |
1978 | ||
13 | Roger M. Needham, Michael D. Schroeder: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21(12): 993-999 (1978) | |
12 | Andrew Birrell, Roger M. Needham: An Asynchronous Garbage Collector for the CAP Filing System. Operating Systems Review 12(2): 31-33 (1978) | |
11 | Andrew Birrell, Roger M. Needham: Character Streams. Operating Systems Review 12(3): 29-31 (1978) | |
1977 | ||
10 | Roger M. Needham, R. D. H. Walker: The Cambridge CAP Computer and its Protection System. SOSP 1977: 1-10 | |
9 | Roger M. Needham, Andrew Birrell: The Cap Filing System. SOSP 1977: 11-16 | |
8 | Roger M. Needham: The CAP Project - An Interim Evaluation. SOSP 1977: 17-22 | |
1974 | ||
7 | Roger M. Needham, Maurice V. Wilkes: Domains of Protection and the Management of Processes. Comput. J. 17(2): 117-120 (1974) | |
1973 | ||
6 | EE | Roger M. Needham: Note on evaluation. Information Storage and Retrieval 9(8): 474 (1973) |
1971 | ||
5 | Roger M. Needham: Handling Difficult Faults in Operating Systems. SOSP 1971: 55-57 | |
4 | B. Landy, Roger M. Needham: Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System. Softw., Pract. Exper. 1(2): 167-173 (1971) | |
1968 | ||
3 | EE | Karen Sparck Jones, Roger M. Needham: Automatic term classifications and retrieval. Information Storage and Retrieval 4(2): 91-100 (1968) |
1962 | ||
2 | Roger M. Needham: A Method for Using Computers in Information Classification. IFIP Congress 1962: 284-287 | |
1959 | ||
1 | A. F. Parker-Rhodes, Roger M. Needham: A reduction method for non-arithmetic data, and its application to thesauric translation. IFIP Congress 1959: 321-325 |