2002 |
68 | EE | Roger M. Needham:
Keynote Address.
Security Protocols Workshop 2002: 2-4 |
67 | EE | Roger M. Needham:
Back to the Beginning.
Security Protocols Workshop 2002: 242 |
2001 |
66 | EE | Roger M. Needham:
Keynote Address: Mobile Computing versus Immobile Security.
Security Protocols Workshop 2001: 1-3 |
2000 |
65 | EE | Roger M. Needham:
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion).
Security Protocols Workshop 2000: 1-4 |
1999 |
64 | EE | Roger M. Needham:
The Hardware Environment.
IEEE Symposium on Security and Privacy 1999: 236 |
63 | | Roger M. Needham:
Keynote Address: The Changing Environment.
Security Protocols Workshop 1999: 1-5 |
1998 |
62 | EE | Ross J. Anderson,
Roger M. Needham,
Adi Shamir:
The Steganographic File System.
Information Hiding 1998: 73-82 |
61 | | Roger M. Needham:
Logic and Over-Simplification.
LICS 1998: 2-3 |
60 | EE | Roger M. Needham,
E. Stewart Lee,
Joan Feigenbaum,
Virgil D. Gligor,
Bruce Christianson:
Panel Session - Future Directions.
Security Protocols Workshop 1998: 227-239 |
59 | | Ross J. Anderson,
Francesco Bergadano,
Bruno Crispo,
Jong-Hyeon Lee,
Charalampos Manifavas,
Roger M. Needham:
A New Family of Authentication Protocols.
Operating Systems Review 32(4): 9-20 (1998) |
1996 |
58 | EE | Martín Abadi,
Roger M. Needham:
Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
1995 |
57 | EE | Ross J. Anderson,
Roger M. Needham:
Robustness Principles for Public Key Protocols.
CRYPTO 1995: 236-247 |
56 | | Ross J. Anderson,
Roger M. Needham:
Programming Satan's Computer.
Computer Science Today 1995: 426-440 |
55 | | Paul W. Jardetzky,
Cormac J. Sreenan,
Roger M. Needham:
Storage and Synchronization for Distributed Continuous Media.
Multimedia Syst. 3(4): 151-161 (1995) |
1994 |
54 | | David J. Wheeler,
Roger M. Needham:
TEA, a Tiny Encryption Algorithm.
FSE 1994: 363-366 |
53 | | Roger M. Needham:
Denail of Service: An Example.
Commun. ACM 37(11): 42-46 (1994) |
1993 |
52 | EE | Roger M. Needham:
Denial of Service.
ACM Conference on Computer and Communications Security 1993: 151-153 |
51 | | Li Gong,
T. Mark A. Lomas,
Roger M. Needham,
Jerome H. Saltzer:
Protecting Poorly Chosen Secrets from Guessing Attacks.
IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993) |
1992 |
50 | | Roger M. Needham,
Akira Nakamura:
An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia?
NOSSDAV 1992: 32-39 |
1991 |
49 | | Roger M. Needham:
What Next? Some Speculations.
Operating Systems of the 90s and Beyond 1991: 220-222 |
48 | | Michael D. Schroeder,
Andrew Birrell,
Michael Burrows,
Hal Murray,
Roger M. Needham,
Thomas L. Rodeheffer,
Edwin H. Satterthwaite,
Charles P. Thacker:
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links.
IEEE Journal on Selected Areas in Communications 9(8): 1318-1335 (1991) |
1990 |
47 | | Li Gong,
Roger M. Needham,
Raphael Yahalom:
Reasoning about Belief in Cryptographic Protocols.
IEEE Symposium on Security and Privacy 1990: 234-248 |
46 | EE | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
45 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Rejoinder to Nessett.
Operating Systems Review 24(2): 39-40 (1990) |
1989 |
44 | | Jean Bacon,
Ian M. Leslie,
Roger M. Needham:
Distributed Computing with a Processor Bank.
Process in Distributed Operating Systems and Distributed Systems Management 1989: 147-161 |
43 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
SOSP 1989: 1-13 |
42 | | T. Mark A. Lomas,
Li Gong,
Jerome H. Saltzer,
Roger M. Needham:
Reducing Risks from Poorly Chosen Keys.
SOSP 1989: 14-18 |
41 | | Roger M. Needham,
Andrew Herbert:
Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England.
Operating Systems Review 23(2): 3-19 (1989) |
1988 |
40 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Authentication: A Practical Study in Belief and Action.
TARK 1988: 325-342 |
39 | | David K. Gifford,
Roger M. Needham,
Michael D. Schroeder:
The Cedar System.
Commun. ACM 31(3): 288-298 (1988) |
38 | | Andrew Hopper,
Roger M. Needham:
The Cambridge Fast Ring Networking System.
IEEE Trans. Computers 37(10): 1214-1223 (1988) |
37 | | Roger M. Needham,
Michael Burrows:
Locks in Distributed Systems - Observations.
Operating Systems Review 22(3): 44 (1988) |
1987 |
36 | | Roger M. Needham,
Michael D. Schroeder:
Authentication Revisited.
Operating Systems Review 21(1): 7 (1987) |
1986 |
35 | EE | Andrew Birrell,
Butler W. Lampson,
Roger M. Needham,
Michael D. Schroeder:
Current work on authentication.
ACM SIGOPS European Workshop 1986 |
34 | EE | Roger M. Needham:
On making distributed systems that work.
ACM SIGOPS European Workshop 1986 |
33 | | Andrew Birrell,
Butler W. Lampson,
Roger M. Needham,
Michael D. Schroeder:
A Global Authentication Service without Global Trust.
IEEE Symposium on Security and Privacy 1986: 223-230 |
1985 |
32 | | Michael D. Schroeder,
David K. Gifford,
Roger M. Needham:
A Caching File System For a Programmer's Workstation.
SOSP 1985: 25-34 |
1984 |
31 | EE | Michael D. Schroeder,
Andrew Birrell,
Roger M. Needham:
Experience with Grapevine: The Growth of a Distributed System
ACM Trans. Comput. Syst. 2(1): 3-23 (1984) |
30 | EE | Ian M. Leslie,
Roger M. Needham,
John W. Burren,
Graham C. Adams:
The architecture of the universe network.
Computer Communication Review 14(2): 2-9 (1984) |
29 | EE | A. Gill Waters,
Christopher J. Adams,
Ian M. Leslie,
Roger M. Needham:
The use of broadcast techniques on the universe network.
Computer Communication Review 14(2): 52-57 (1984) |
1983 |
28 | | Roger M. Needham:
Protection.
Advanced Course: Local Area Networks 1983: 260-281 |
27 | | M. F. Richardson,
Roger M. Needham:
The TRIPOS Filing Machine, a Front End to a File Server.
SOSP 1983: 120-128 |
26 | | Michael D. Schroeder,
Andrew Birrell,
Roger M. Needham:
Experience with Grapevine: The Growth of a Distributed System (Summary).
SOSP 1983: 141-142 |
25 | | Roger M. Needham,
A. J. Herbert,
James G. Mitchell:
How to Connect Stable Memory to a Computer.
Operating Systems Review 17(1): 16 (1983) |
1982 |
24 | | Andrew Birrell,
Roy Levin,
Roger M. Needham,
Michael D. Schroeder:
Grapevine: An Exercise in Distributed Computing.
Commun. ACM 25(4): 260-274 (1982) |
1981 |
23 | | Roger M. Needham:
Design Considerations for a Processing Server.
ISCA 1981: 501-504 |
22 | | Andrew Birrell,
Roy Levin,
Roger M. Needham,
Michael D. Schroeder:
Gravevine: An Exercise in Distributed Computing (summary).
SOSP 1981: 178-179 |
21 | | A. J. Herbert,
Roger M. Needham:
Sequencing Computation Steps in a Network.
SOSP 1981: 59-63 |
1980 |
20 | | Roger M. Needham:
Capabilities and Protection.
GI Jahrestagung 1980: 45-53 |
19 | | Andrew Birrell,
Roger M. Needham:
A Universal File Server.
IEEE Trans. Software Eng. 6(5): 450-453 (1980) |
18 | | Maurice V. Wilkes,
Roger M. Needham:
The Cambridge Model Distributed System.
Operating Systems Review 14(1): 21-29 (1980) |
17 | | N. H. Garnett,
Roger M. Needham:
An Asynchronous Garbage Collector for the Cambridge File Server.
Operating Systems Review 14(4): 36-40 (1980) |
1979 |
16 | | Roger M. Needham:
Systems Aspects of the Cambridge Ring.
SOSP 1979: 82-85 |
15 | | Roger M. Needham:
Adding Capability to Conventional File Servers.
Operating Systems Review 13(1): 3-4 (1979) |
14 | | Hugh C. Lauer,
Roger M. Needham:
On the Duality of Operating System Structures.
Operating Systems Review 13(2): 3-19 (1979) |
1978 |
13 | | Roger M. Needham,
Michael D. Schroeder:
Using Encryption for Authentication in Large Networks of Computers.
Commun. ACM 21(12): 993-999 (1978) |
12 | | Andrew Birrell,
Roger M. Needham:
An Asynchronous Garbage Collector for the CAP Filing System.
Operating Systems Review 12(2): 31-33 (1978) |
11 | | Andrew Birrell,
Roger M. Needham:
Character Streams.
Operating Systems Review 12(3): 29-31 (1978) |
1977 |
10 | | Roger M. Needham,
R. D. H. Walker:
The Cambridge CAP Computer and its Protection System.
SOSP 1977: 1-10 |
9 | | Roger M. Needham,
Andrew Birrell:
The Cap Filing System.
SOSP 1977: 11-16 |
8 | | Roger M. Needham:
The CAP Project - An Interim Evaluation.
SOSP 1977: 17-22 |
1974 |
7 | | Roger M. Needham,
Maurice V. Wilkes:
Domains of Protection and the Management of Processes.
Comput. J. 17(2): 117-120 (1974) |
1973 |
6 | EE | Roger M. Needham:
Note on evaluation.
Information Storage and Retrieval 9(8): 474 (1973) |
1971 |
5 | | Roger M. Needham:
Handling Difficult Faults in Operating Systems.
SOSP 1971: 55-57 |
4 | | B. Landy,
Roger M. Needham:
Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System.
Softw., Pract. Exper. 1(2): 167-173 (1971) |
1968 |
3 | EE | Karen Sparck Jones,
Roger M. Needham:
Automatic term classifications and retrieval.
Information Storage and Retrieval 4(2): 91-100 (1968) |
1962 |
2 | | Roger M. Needham:
A Method for Using Computers in Information Classification.
IFIP Congress 1962: 284-287 |
1959 |
1 | | A. F. Parker-Rhodes,
Roger M. Needham:
A reduction method for non-arithmetic data, and its application to thesauric translation.
IFIP Congress 1959: 321-325 |