Roger M. Needham

According to our database1, Roger M. Needham authored at least 75 papers between 1959 and 2002.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 1994, "".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2002
Back to the Beginning.
Proceedings of the Security Protocols, 2002

Keynote Address.
Proceedings of the Security Protocols, 2002

2001
Keynote Address: Mobile Computing versus Immobile Security.
Proceedings of the Security Protocols, 2001

2000
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Keynote Address: The Changing Environment.
Proceedings of the Security Protocols, 1999

The Hardware Environment.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1998
A New Family of Authentication Protocols.
Operating Systems Review, 1998

Panel Session - Future Directions.
Proceedings of the Security Protocols, 1998

Logic and Over-Simplification.
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998

The Steganographic File System.
Proceedings of the Information Hiding, 1998

1996
Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng., 1996

1995
Storage and Synchronization for Distributed Continuous Media.
Multimedia Syst., 1995

Robustness Principles for Public Key Protocols.
Proceedings of the Advances in Cryptology, 1995

Programming Satan's Computer.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
Denail of Service: An Example.
Commun. ACM, 1994

Prudent engineering practice for cryptographic protocols.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

TEA, a Tiny Encryption Algorithm.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Protecting Poorly Chosen Secrets from Guessing Attacks.
IEEE Journal on Selected Areas in Communications, 1993

Denial of Service.
Proceedings of the CCS '93, 1993

1992
Later Developments at Cambridge: Titan, Cap, and the Cambridge Ring.
IEEE Annals of the History of Computing, 1992

An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia?
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1992

1991
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links.
IEEE Journal on Selected Areas in Communications, 1991

What Next? Some Speculations.
Proceedings of the Operating Systems of the 90s and Beyond, International Workshop, 1991

1990
A Logic of Authentication.
ACM Trans. Comput. Syst., 1990

Rejoinder to Nessett.
Operating Systems Review, 1990

Reasoning about Belief in Cryptographic Protocols.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

1989
Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England.
Operating Systems Review, 1989

Reducing Risks from Poorly Chosen Keys.
Proceedings of the Twelfth ACM Symposium on Operating System Principles, 1989

A Logic of Authentication.
Proceedings of the Twelfth ACM Symposium on Operating System Principles, 1989

Distributed Computing with a Processor Bank.
Proceedings of the Process in Distributed Operating Systems and Distributed Systems Management, 1989

The Scope of a Logic of Authentication.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
The Cambridge Fast Ring Networking System.
IEEE Trans. Computers, 1988

Locks in Distributed Systems - Observations.
Operating Systems Review, 1988

The Cedar System.
Commun. ACM, 1988

Authentication: A Practical Study in Belief and Action.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988

1987
Authentication Revisited.
Operating Systems Review, 1987

1986
A Global Authentication Service without Global Trust.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

On making distributed systems that work.
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986

Current work on authentication.
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986

1985
A Caching File System For a Programmer's Workstation.
Proceedings of the Tenth ACM Symposium on Operating System Principles, 1985

1984
Experience with Grapevine: The Growth of a Distributed System
ACM Trans. Comput. Syst., 1984

The use of broadcast techniques on the universe network.
Computer Communication Review, 1984

The architecture of the universe network.
Computer Communication Review, 1984

1983
How to Connect Stable Memory to a Computer.
Operating Systems Review, 1983

Experience with Grapevine: The Growth of a Distributed System (Summary).
Proceedings of the Ninth ACM Symposium on Operating System Principles, 1983

The TRIPOS Filing Machine, a Front End to a File Server.
Proceedings of the Ninth ACM Symposium on Operating System Principles, 1983

Protection.
Proceedings of the Local Area Networks: An Advanced Course, 1983

1982
Grapevine: An Exercise in Distributed Computing.
Commun. ACM, 1982

1981
Sequencing Computation Steps in a Network.
Proceedings of the Eighth Symposium on Operating System Principles, 1981

Gravevine: An Exercise in Distributed Computing (summary).
Proceedings of the Eighth Symposium on Operating System Principles, 1981

Design Considerations for a Processing Server.
Proceedings of the 8th Annual Symposium on Computer Architecture, 1981

1980
A Universal File Server.
IEEE Trans. Software Eng., 1980

The Cambridge Model Distributed System.
Operating Systems Review, 1980

An Asynchronous Garbage Collector for the Cambridge File Server.
Operating Systems Review, 1980

Capabilities and Protection.
Proceedings of the GI - 10. Jahrestagung, Saarbrücken, 30. September, 1980

1979
Adding Capability to Conventional File Servers.
Operating Systems Review, 1979

On the Duality of Operating System Structures.
Operating Systems Review, 1979

Systems Aspects of the Cambridge Ring.
Proceedings of the Seventh Symposium on Operating System Principles, 1979

1978
Character Streams.
Operating Systems Review, 1978

An Asynchronous Garbage Collector for the CAP Filing System.
Operating Systems Review, 1978

Using Encryption for Authentication in Large Networks of Computers.
Commun. ACM, 1978

1977
The Cambridge CAP Computer and its Protection System.
Proceedings of the Sixth Symposium on Operating System Principles, 1977

The Cap Filing System.
Proceedings of the Sixth Symposium on Operating System Principles, 1977

The CAP Project - An Interim Evaluation.
Proceedings of the Sixth Symposium on Operating System Principles, 1977

1974
Domains of Protection and the Management of Processes.
Comput. J., 1974

1973
Note on evaluation.
Information Storage and Retrieval, 1973

1972
Protection systems and protection implementations.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972

1971
Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System.
Softw., Pract. Exper., 1971

Handling Difficult Faults in Operating Systems.
Proceedings of the Third Symposium on Operating System Principles, 1971

1969
Theory and practice in operating system design.
Proceedings of the Second Symposium on Operating Systems Principles, 1969

1968
Automatic term classifications and retrieval.
Information Storage and Retrieval, 1968

1967
File handling at Cambridge University.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '67 Spring Joint Computer Conference, 1967

1965
Applications of the theory of clumps.
Mech. Translat. & Comp. Linguistics, 1965

1962
A Method for Using Computers in Information Classification.
IFIP Congress, 1962

1959
A reduction method for non-arithmetic data, and its application to thesauric translation.
IFIP Congress, 1959


  Loading...