1999 |
12 | | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
Secure Internet Programming 1999: 395-412 |
1998 |
11 | EE | Martín Abadi,
Andrew Birrell,
Raymie Stata,
Edward Wobber:
Secure Web Tunneling.
Computer Networks 30(1-7): 531-539 (1998) |
1997 |
10 | EE | Kenneth F. Alden,
Edward Wobber:
The AltaVista Tunnel Using the Internet to Extend Corporate Networks.
Digital Technical Journal 9(2): (1997) |
1996 |
9 | EE | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
IEEE Symposium on Security and Privacy 1996: 211-221 |
1995 |
8 | | Andrew Birrell,
Greg Nelson,
Susan S. Owicki,
Edward Wobber:
Network Objects
Softw., Pract. Exper. 25(S4): S4/87-S4/130 (1995) |
1994 |
7 | EE | Edward Wobber,
Martín Abadi,
Michael Burrows:
Authentication in the Taos Operating System.
ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
1993 |
6 | | Andrew Birrell,
Greg Nelson,
Susan S. Owicki,
Edward Wobber:
Network Objects.
SOSP 1993: 217-230 |
5 | | Edward Wobber,
Martín Abadi,
Michael Burrows,
Butler W. Lampson:
Authentication in the Taos Operating System.
SOSP 1993: 256-269 |
1992 |
4 | EE | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst. 10(4): 265-310 (1992) |
1991 |
3 | | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
SOSP 1991: 165-182 |
1990 |
2 | | Francis J. Prusker,
Edward Wobber:
The Siphon: Managing Distant Replicated Repositories.
Workshop on the Management of Replicated Data 1990: 44-47 |
1987 |
1 | | Andrew Birrell,
Michael B. Jones,
Edward Wobber:
A Simple and Efficient Implementation for Small Databases.
SOSP 1987: 149-154 |