default search action
BibTeX records: Roger M. Needham
@inproceedings{DBLP:conf/spw/Needham02, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {2--4}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_2}, doi = {10.1007/978-3-540-39871-4\_2}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham02a, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Back to the Beginning}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {242}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_20}, doi = {10.1007/978-3-540-39871-4\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham01, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address: Mobile Computing versus Immobile Security}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {1--3}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_1}, doi = {10.1007/3-540-45807-7\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham00, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {1--4}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_1}, doi = {10.1007/3-540-44810-1\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Needham99, author = {Roger M. Needham}, title = {The Hardware Environment}, booktitle = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999}, pages = {236}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SECPRI.1999.766918}, doi = {10.1109/SECPRI.1999.766918}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/Needham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham99, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address: The Changing Environment}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {1--5}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_1}, doi = {10.1007/10720107\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/AndersonBCLMN98, author = {Ross J. Anderson and Francesco Bergadano and Bruno Crispo and Jong{-}Hyeon Lee and Charalampos Manifavas and Roger M. Needham}, title = {A New Family of Authentication Protocols}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {9--20}, year = {1998}, url = {https://doi.org/10.1145/302350.302353}, doi = {10.1145/302350.302353}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/AndersonBCLMN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AndersonNS98, author = {Ross J. Anderson and Roger M. Needham and Adi Shamir}, editor = {David Aucsmith}, title = {The Steganographic File System}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {73--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_6}, doi = {10.1007/3-540-49380-8\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/AndersonNS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Needham98, author = {Roger M. Needham}, title = {Logic and Over-Simplification}, booktitle = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis, Indiana, USA, June 21-24, 1998}, pages = {2--3}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/LICS.1998.705638}, doi = {10.1109/LICS.1998.705638}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Needham98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NeedhamLFGC98, author = {Roger M. Needham and E. Stewart Lee and Joan Feigenbaum and Virgil D. Gligor and Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Panel Session - Future Directions}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {227--239}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_31}, doi = {10.1007/3-540-49135-X\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Needham97, author = {Roger M. Needham}, title = {The changing environment for security protocols}, journal = {{IEEE} Netw.}, volume = {11}, number = {3}, pages = {12--15}, year = {1997}, url = {https://doi.org/10.1109/65.587044}, doi = {10.1109/65.587044}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Needham97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AbadiN96, author = {Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Prudent Engineering Practice for Cryptographic Protocols}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {1}, pages = {6--15}, year = {1996}, url = {https://doi.org/10.1109/32.481513}, doi = {10.1109/32.481513}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AbadiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/JardetzkySN95, author = {Paul W. Jardetzky and Cormac J. Sreenan and Roger M. Needham}, title = {Storage and Synchronization for Distributed Continuous Media}, journal = {Multim. Syst.}, volume = {3}, number = {4}, pages = {151--161}, year = {1995}, url = {https://doi.org/10.1007/BF02176236}, doi = {10.1007/BF02176236}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/JardetzkySN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AndersonN95, author = {Ross J. Anderson and Roger M. Needham}, editor = {Don Coppersmith}, title = {Robustness Principles for Public Key Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {236--247}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_19}, doi = {10.1007/3-540-44750-4\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AndersonN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/cstoday95/AndersonN95, author = {Ross J. Anderson and Roger M. Needham}, editor = {Jan van Leeuwen}, title = {Programming Satan's Computer}, booktitle = {Computer Science Today: Recent Trends and Developments}, series = {Lecture Notes in Computer Science}, volume = {1000}, pages = {426--440}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0015258}, doi = {10.1007/BFB0015258}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/books/sp/cstoday95/AndersonN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Needham94, author = {Roger M. Needham}, title = {Denail of Service: An Example}, journal = {Commun. {ACM}}, volume = {37}, number = {11}, pages = {42--46}, year = {1994}, url = {https://doi.org/10.1145/188280.188294}, doi = {10.1145/188280.188294}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Needham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WheelerN94, author = {David J. Wheeler and Roger M. Needham}, editor = {Bart Preneel}, title = {TEA, a Tiny Encryption Algorithm}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {363--366}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_29}, doi = {10.1007/3-540-60590-8\_29}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/WheelerN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbadiN94, author = {Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Prudent engineering practice for cryptographic protocols}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296587}, doi = {10.1109/RISP.1994.296587}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbadiN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongLNS93, author = {Li Gong and T. Mark A. Lomas and Roger M. Needham and Jerome H. Saltzer}, title = {Protecting Poorly Chosen Secrets from Guessing Attacks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {648--656}, year = {1993}, url = {https://doi.org/10.1109/49.223865}, doi = {10.1109/49.223865}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongLNS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Needham93, author = {Roger M. Needham}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Denial of Service}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {151--153}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168607}, doi = {10.1145/168588.168607}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Needham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/annals/Needham92, author = {Roger M. Needham}, title = {Later Developments at Cambridge: Titan, Cap, and the Cambridge Ring}, journal = {{IEEE} Ann. Hist. Comput.}, volume = {14}, number = {4}, pages = {57--58}, year = {1992}, url = {https://doi.org/10.1109/85.194056}, doi = {10.1109/85.194056}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/annals/Needham92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nossdav/NeedhamN92, author = {Roger M. Needham and Akira Nakamura}, editor = {P. Venkat Rangan}, title = {An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia?}, booktitle = {Network and Operating System Support for Digital Audio and Video, Third International Workshop, La Jolla, California, USA, November 12-13, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {712}, pages = {32--39}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57183-3\_4}, doi = {10.1007/3-540-57183-3\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/nossdav/NeedhamN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SchroederBBMNRST91, author = {Michael D. Schroeder and Andrew Birrell and Michael Burrows and Hal Murray and Roger M. Needham and Thomas L. Rodeheffer and Edwin H. Satterthwaite and Charles P. Thacker}, title = {Autonet: {A} High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {9}, number = {8}, pages = {1318--1335}, year = {1991}, url = {https://doi.org/10.1109/49.105178}, doi = {10.1109/49.105178}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SchroederBBMNRST91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Needham91, author = {Roger M. Needham}, editor = {Arthur I. Karshmer and J{\"{u}}rgen Nehmer}, title = {What Next? Some Speculations}, booktitle = {Operating Systems of the 90s and Beyond, International Workshop, Dagstuhl Castle, Germany, July 8-12, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {563}, pages = {220--222}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0024547}, doi = {10.1007/BFB0024547}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Needham91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BurrowsAN90, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Rejoinder to Nessett}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {24}, number = {2}, pages = {39--40}, year = {1990}, url = {https://doi.org/10.1145/382258.382790}, doi = {10.1145/382258.382790}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BurrowsAN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/BurrowsAN90, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {A Logic of Authentication}, journal = {{ACM} Trans. Comput. Syst.}, volume = {8}, number = {1}, pages = {18--36}, year = {1990}, url = {https://doi.org/10.1145/77648.77649}, doi = {10.1145/77648.77649}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/BurrowsAN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cassp/Needham90, author = {Roger M. Needham}, editor = {John Rosenberg and J. Leslie Keedy}, title = {Capabilities and Security}, booktitle = {Security and Persistence, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8-11 May 1990, Bremen, West Germany}, series = {Workshops in Computing}, pages = {3--8}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/978-1-4471-3178-6\_1}, doi = {10.1007/978-1-4471-3178-6\_1}, timestamp = {Wed, 06 Apr 2022 08:42:11 +0200}, biburl = {https://dblp.org/rec/conf/cassp/Needham90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GongNY90, author = {Li Gong and Roger M. Needham and Raphael Yahalom}, title = {Reasoning about Belief in Cryptographic Protocols}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {234--248}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63854}, doi = {10.1109/RISP.1990.63854}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/GongNY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/NeedhamH89, author = {Roger M. Needham and Andrew Herbert}, title = {Report on the Third European {SIGOPS} Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {23}, number = {2}, pages = {3--19}, year = {1989}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/NeedhamH89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BurrowsAN89, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Joan Feigenbaum and Michael Merritt}, title = {The Scope of a Logic of Authentication}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {119--126}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/07}, doi = {10.1090/DIMACS/002/07}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdos/BaconLN89, author = {Jean Bacon and Ian M. Leslie and Roger M. Needham}, editor = {Wolfgang Schr{\"{o}}der{-}Preikschat and Wolfgang Zimmer}, title = {Distributed Computing with a Processor Bank}, booktitle = {Process in Distributed Operating Systems and Distributed Systems Management, European Workshop, Berlin, Germany, April 18-19, 1889}, series = {Lecture Notes in Computer Science}, volume = {433}, pages = {147--161}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-52609-9\_82}, doi = {10.1007/3-540-52609-9\_82}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/pdos/BaconLN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/BurrowsAN89, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Gregory R. Andrews}, title = {A Logic of Authentication}, booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles, {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6, 1989}, pages = {1--13}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/74850.74852}, doi = {10.1145/74850.74852}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/BurrowsAN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/LomasGSN89, author = {T. Mark A. Lomas and Li Gong and Jerome H. Saltzer and Roger M. Needham}, editor = {Gregory R. Andrews}, title = {Reducing Risks from Poorly Chosen Keys}, booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles, {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6, 1989}, pages = {14--18}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/74850.74853}, doi = {10.1145/74850.74853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/LomasGSN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GiffordNS88, author = {David K. Gifford and Roger M. Needham and Michael D. Schroeder}, title = {The Cedar System}, journal = {Commun. {ACM}}, volume = {31}, number = {3}, pages = {288--298}, year = {1988}, url = {https://doi.org/10.1145/42392.42398}, doi = {10.1145/42392.42398}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GiffordNS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/NeedhamB88, author = {Roger M. Needham and Michael Burrows}, title = {Locks in Distributed Systems - Observations}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {22}, number = {3}, pages = {44}, year = {1988}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/NeedhamB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HopperN88, author = {Andrew Hopper and Roger M. Needham}, title = {The Cambridge Fast Ring Networking System}, journal = {{IEEE} Trans. Computers}, volume = {37}, number = {10}, pages = {1214--1223}, year = {1988}, url = {https://doi.org/10.1109/12.5983}, doi = {10.1109/12.5983}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HopperN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tark/BurrowsAN88, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Moshe Y. Vardi}, title = {Authentication: {A} Practical Study in Belief and Action}, booktitle = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, Pacific Grove, CA, USA, March 1988}, pages = {325--342}, publisher = {Morgan Kaufmann}, year = {1988}, timestamp = {Thu, 21 Jun 2018 07:50:39 +0200}, biburl = {https://dblp.org/rec/conf/tark/BurrowsAN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/NeedhamS87, author = {Roger M. Needham and Michael D. Schroeder}, title = {Authentication Revisited}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {21}, number = {1}, pages = {7}, year = {1987}, url = {https://doi.org/10.1145/24592.24593}, doi = {10.1145/24592.24593}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/NeedhamS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/BirrellLNS86, author = {Andrew Birrell and Butler W. Lampson and Roger M. Needham and Michael D. Schroeder}, title = {Current work on authentication}, booktitle = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam, Netherlands, September 8-10, 1986}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/503956.503966}, doi = {10.1145/503956.503966}, timestamp = {Thu, 07 Nov 2019 10:24:25 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/BirrellLNS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/Needham86, author = {Roger M. Needham}, title = {On making distributed systems that work}, booktitle = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam, Netherlands, September 8-10, 1986}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/503956.503993}, doi = {10.1145/503956.503993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/Needham86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BirrellLNS86, author = {Andrew Birrell and Butler W. Lampson and Roger M. Needham and Michael D. Schroeder}, title = {A Global Authentication Service without Global Trust}, booktitle = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 7-9, 1986}, pages = {223--230}, publisher = {{IEEE} Computer Society}, year = {1986}, url = {https://doi.org/10.1109/SP.1986.10009}, doi = {10.1109/SP.1986.10009}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/BirrellLNS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/SchroederGN85, author = {Michael D. Schroeder and David K. Gifford and Roger M. Needham}, editor = {Forest Baskett and Andrew Birrell and David R. Cheriton}, title = {A Caching File System For a Programmer's Workstation}, booktitle = {Proceedings of the Tenth {ACM} Symposium on Operating System Principles, {SOSP} 1985, Orcas Island, Washington, USA, December 1-4, 1985}, pages = {25--34}, publisher = {{ACM}}, year = {1985}, url = {https://doi.org/10.1145/323647.323632}, doi = {10.1145/323647.323632}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/SchroederGN85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/LeslieNBA84, author = {Ian M. Leslie and Roger M. Needham and John W. Burren and Graham C. Adams}, title = {The architecture of the universe network}, journal = {Comput. Commun. Rev.}, volume = {14}, number = {2}, pages = {2--9}, year = {1984}, url = {https://doi.org/10.1145/800056.802053}, doi = {10.1145/800056.802053}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/LeslieNBA84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/WatersALN84, author = {A. Gill Waters and Christopher J. Adams and Ian M. Leslie and Roger M. Needham}, title = {The use of broadcast techniques on the universe network}, journal = {Comput. Commun. Rev.}, volume = {14}, number = {2}, pages = {52--57}, year = {1984}, url = {https://doi.org/10.1145/800056.802059}, doi = {10.1145/800056.802059}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/WatersALN84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/SchroederBN84, author = {Michael D. Schroeder and Andrew Birrell and Roger M. Needham}, title = {Experience with Grapevine: The Growth of a Distributed System}, journal = {{ACM} Trans. Comput. Syst.}, volume = {2}, number = {1}, pages = {3--23}, year = {1984}, url = {https://doi.org/10.1145/2080.2081}, doi = {10.1145/2080.2081}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/SchroederBN84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/NeedhamHM83, author = {Roger M. Needham and A. J. Herbert and James G. Mitchell}, title = {How to Connect Stable Memory to a Computer}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {17}, number = {1}, pages = {16}, year = {1983}, url = {https://doi.org/10.1145/850733.850736}, doi = {10.1145/850733.850736}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/NeedhamHM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Needham83, author = {Roger M. Needham}, editor = {David Hutchison and John A. Mariani and Doug Shepherd}, title = {Protection}, booktitle = {Local Area Networks: An Advanced Course, Glasgow, UK, July 11-22, 1983, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {184}, pages = {260--281}, publisher = {Springer}, year = {1983}, url = {https://doi.org/10.1007/3-540-15191-5\_23}, doi = {10.1007/3-540-15191-5\_23}, timestamp = {Mon, 26 Sep 2022 16:14:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Needham83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/RichardsonN83, author = {M. F. Richardson and Roger M. Needham}, editor = {Jerome H. Saltzer and Roy Levin and David D. Redell}, title = {The {TRIPOS} Filing Machine, a Front End to a File Server}, booktitle = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles, {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983}, pages = {120--128}, publisher = {{ACM}}, year = {1983}, url = {https://doi.org/10.1145/800217.806620}, doi = {10.1145/800217.806620}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/RichardsonN83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/SchroederBN83, author = {Michael D. Schroeder and Andrew Birrell and Roger M. Needham}, editor = {Jerome H. Saltzer and Roy Levin and David D. Redell}, title = {Experience with Grapevine: The Growth of a Distributed System (Summary)}, booktitle = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles, {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983}, pages = {141--142}, publisher = {{ACM}}, year = {1983}, url = {https://doi.org/10.1145/800217.806622}, doi = {10.1145/800217.806622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/SchroederBN83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BirrellLNS82, author = {Andrew Birrell and Roy Levin and Roger M. Needham and Michael D. Schroeder}, title = {Grapevine: An Exercise in Distributed Computing}, journal = {Commun. {ACM}}, volume = {25}, number = {4}, pages = {260--274}, year = {1982}, url = {https://doi.org/10.1145/358468.358487}, doi = {10.1145/358468.358487}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BirrellLNS82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/Needham81, author = {Roger M. Needham}, editor = {Richard Y. Kain and William R. Franta}, title = {Design Considerations for a Processing Server}, booktitle = {Proceedings of the 8th Annual Symposium on Computer Architecture, Minneapolis, MN, USA, May 1981}, pages = {501--504}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {http://dl.acm.org/citation.cfm?id=801900}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/Needham81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/HerbertN81, author = {A. J. Herbert and Roger M. Needham}, editor = {John Howard and David P. Reed}, title = {Sequencing Computation Steps in a Network}, booktitle = {Proceedings of the Eighth Symposium on Operating System Principles, {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California, USA, December 14-16, 1981}, pages = {59--63}, publisher = {{ACM}}, year = {1981}, url = {https://doi.org/10.1145/800216.806592}, doi = {10.1145/800216.806592}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/HerbertN81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/BirrellLNS81, author = {Andrew Birrell and Roy Levin and Roger M. Needham and Michael D. Schroeder}, editor = {John Howard and David P. Reed}, title = {Gravevine: An Exercise in Distributed Computing (summary)}, booktitle = {Proceedings of the Eighth Symposium on Operating System Principles, {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California, USA, December 14-16, 1981}, pages = {178--179}, publisher = {{ACM}}, year = {1981}, url = {https://doi.org/10.1145/800216.806606}, doi = {10.1145/800216.806606}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/BirrellLNS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/WilkesN80, author = {Maurice V. Wilkes and Roger M. Needham}, title = {The Cambridge Model Distributed System}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {14}, number = {1}, pages = {21--29}, year = {1980}, url = {https://doi.org/10.1145/850693.850695}, doi = {10.1145/850693.850695}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/WilkesN80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/GarnettN80, author = {N. H. Garnett and Roger M. Needham}, title = {An Asynchronous Garbage Collector for the Cambridge File Server}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {14}, number = {4}, pages = {36--40}, year = {1980}, url = {https://doi.org/10.1145/850708.850711}, doi = {10.1145/850708.850711}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/GarnettN80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BirrellN80, author = {Andrew Birrell and Roger M. Needham}, title = {A Universal File Server}, journal = {{IEEE} Trans. Software Eng.}, volume = {6}, number = {5}, pages = {450--453}, year = {1980}, url = {https://doi.org/10.1109/TSE.1980.230493}, doi = {10.1109/TSE.1980.230493}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BirrellN80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/Needham80, author = {Roger M. Needham}, editor = {Reinhard Wilhelm}, title = {Capabilities and Protection}, booktitle = {{GI} - 10. Jahrestagung, Saarbr{\"{u}}cken, 30. September - 2. Oktober 1980, Proceedings}, series = {Informatik-Fachberichte}, volume = {33}, pages = {45--53}, publisher = {Springer}, year = {1980}, url = {https://doi.org/10.1007/978-3-642-67838-7\_3}, doi = {10.1007/978-3-642-67838-7\_3}, timestamp = {Tue, 23 May 2017 01:10:33 +0200}, biburl = {https://dblp.org/rec/conf/gi/Needham80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Needham79, author = {Roger M. Needham}, title = {Adding Capability to Conventional File Servers}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {13}, number = {1}, pages = {3--4}, year = {1979}, url = {https://doi.org/10.1145/850652.850653}, doi = {10.1145/850652.850653}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Needham79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/LauerN79, author = {Hugh C. Lauer and Roger M. Needham}, title = {On the Duality of Operating System Structures}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {13}, number = {2}, pages = {3--19}, year = {1979}, url = {https://doi.org/10.1145/850657.850658}, doi = {10.1145/850657.850658}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/LauerN79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/Needham79, author = {Roger M. Needham}, editor = {Michael D. Schroeder and Anita K. Jones}, title = {Systems Aspects of the Cambridge Ring}, booktitle = {Proceedings of the Seventh Symposium on Operating System Principles, {SOSP} 1979, Asilomar Conference Grounds, Pacific Grove, California, USA, 10-12, December 1979}, pages = {82--85}, publisher = {{ACM}}, year = {1979}, url = {https://doi.org/10.1145/800215.806573}, doi = {10.1145/800215.806573}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/Needham79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/NeedhamS78, author = {Roger M. Needham and Michael D. Schroeder}, title = {Using Encryption for Authentication in Large Networks of Computers}, journal = {Commun. {ACM}}, volume = {21}, number = {12}, pages = {993--999}, year = {1978}, url = {https://doi.org/10.1145/359657.359659}, doi = {10.1145/359657.359659}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/NeedhamS78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BirrellN78, author = {Andrew Birrell and Roger M. Needham}, title = {An Asynchronous Garbage Collector for the {CAP} Filing System}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {12}, number = {2}, pages = {31--33}, year = {1978}, url = {https://doi.org/10.1145/775332.775338}, doi = {10.1145/775332.775338}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BirrellN78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BirrellN78a, author = {Andrew Birrell and Roger M. Needham}, title = {Character Streams}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {12}, number = {3}, pages = {29--31}, year = {1978}, url = {https://doi.org/10.1145/775396.775399}, doi = {10.1145/775396.775399}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BirrellN78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/NeedhamW77, author = {Roger M. Needham and R. D. H. Walker}, editor = {Saul Rosen and Peter J. Denning}, title = {The Cambridge {CAP} Computer and its Protection System}, booktitle = {Proceedings of the Sixth Symposium on Operating System Principles, {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November 16-18, 1977}, pages = {1--10}, publisher = {{ACM}}, year = {1977}, url = {https://doi.org/10.1145/800214.806541}, doi = {10.1145/800214.806541}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/NeedhamW77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/NeedhamB77, author = {Roger M. Needham and Andrew Birrell}, editor = {Saul Rosen and Peter J. Denning}, title = {The Cap Filing System}, booktitle = {Proceedings of the Sixth Symposium on Operating System Principles, {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November 16-18, 1977}, pages = {11--16}, publisher = {{ACM}}, year = {1977}, url = {https://doi.org/10.1145/800214.806542}, doi = {10.1145/800214.806542}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/NeedhamB77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/Needham77, author = {Roger M. Needham}, editor = {Saul Rosen and Peter J. Denning}, title = {The {CAP} Project - An Interim Evaluation}, booktitle = {Proceedings of the Sixth Symposium on Operating System Principles, {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November 16-18, 1977}, pages = {17--22}, publisher = {{ACM}}, year = {1977}, url = {https://doi.org/10.1145/800214.806543}, doi = {10.1145/800214.806543}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/Needham77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NeedhamW74, author = {Roger M. Needham and Maurice V. Wilkes}, title = {Domains of Protection and the Management of Processes}, journal = {Comput. J.}, volume = {17}, number = {2}, pages = {117--120}, year = {1974}, url = {https://doi.org/10.1093/comjnl/17.2.117}, doi = {10.1093/COMJNL/17.2.117}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NeedhamW74.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/Needham73, author = {Roger M. Needham}, title = {Note on evaluation}, journal = {Inf. Storage Retr.}, volume = {9}, number = {8}, pages = {474}, year = {1973}, url = {https://doi.org/10.1016/0020-0271(73)90098-3}, doi = {10.1016/0020-0271(73)90098-3}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/Needham73.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/afips/Needham72, author = {Roger M. Needham}, title = {Protection systems and protection implementations}, booktitle = {American Federation of Information Processing Societies: Proceedings of the {AFIPS} '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, {USA} - Part {I}}, series = {{AFIPS} Conference Proceedings}, volume = {41}, pages = {571--578}, publisher = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}}, year = {1972}, url = {https://doi.org/10.1145/1479992.1480073}, doi = {10.1145/1479992.1480073}, timestamp = {Wed, 14 Apr 2021 16:50:07 +0200}, biburl = {https://dblp.org/rec/conf/afips/Needham72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/LandyN71, author = {B. Landy and Roger M. Needham}, title = {Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System}, journal = {Softw. Pract. Exp.}, volume = {1}, number = {2}, pages = {167--173}, year = {1971}, url = {https://doi.org/10.1002/spe.4380010207}, doi = {10.1002/SPE.4380010207}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/LandyN71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/Needham71, author = {Roger M. Needham}, editor = {Edward J. McCluskey and Nicholas A. Fortis and Butler W. Lampson and Thomas H. Bredt}, title = {Handling Difficult Faults in Operating Systems}, booktitle = {Proceedings of the Third Symposium on Operating System Principles, {SOSP} 1971, Stanford University, Palo Alto, California, USA, October 18-20, 1971}, pages = {55--57}, publisher = {{ACM}}, year = {1971}, url = {https://doi.org/10.1145/800212.806499}, doi = {10.1145/800212.806499}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/Needham71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/NeedhamH69, author = {Roger M. Needham and David F. Hartley}, editor = {Peter J. Denning and Edward G. Coffman Jr.}, title = {Theory and practice in operating system design}, booktitle = {Proceedings of the Second Symposium on Operating Systems Principles, {SOSP} 1969, Princeton, NJ, USA, October 20-22, 1969}, pages = {8--12}, publisher = {{ACM}}, year = {1969}, url = {https://doi.org/10.1145/961053.961058}, doi = {10.1145/961053.961058}, timestamp = {Mon, 13 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sosp/NeedhamH69.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WilkesN68, author = {Maurice V. Wilkes and Roger M. Needham}, title = {The Design of Multiple-Access Computer Systems: Part 2}, journal = {Comput. J.}, volume = {10}, number = {4}, pages = {315--320}, year = {1968}, url = {https://doi.org/10.1093/comjnl/10.4.315}, doi = {10.1093/COMJNL/10.4.315}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WilkesN68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HartleyLN68, author = {David F. Hartley and B. Landy and Roger M. Needham}, title = {The structure of a multiprogramming supervisor}, journal = {Comput. J.}, volume = {11}, number = {3}, pages = {247--255}, year = {1968}, url = {https://doi.org/10.1093/comjnl/11.3.247}, doi = {10.1093/COMJNL/11.3.247}, timestamp = {Mon, 13 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HartleyLN68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/JonesN68, author = {Karen Sparck Jones and Roger M. Needham}, title = {Automatic term classifications and retrieval}, journal = {Inf. Storage Retr.}, volume = {4}, number = {2}, pages = {91--100}, year = {1968}, url = {https://doi.org/10.1016/0020-0271(68)90013-2}, doi = {10.1016/0020-0271(68)90013-2}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/JonesN68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/afips/BarronFHLN67, author = {David W. Barron and A. G. Fraser and David F. Hartley and B. Landy and Roger M. Needham}, title = {File handling at Cambridge University}, booktitle = {American Federation of Information Processing Societies: Proceedings of the {AFIPS} '67 Spring Joint Computer Conference, April 18-20, 1967, Atlantic City, New Jersey, {USA}}, series = {{AFIPS} Conference Proceedings}, volume = {30}, pages = {163--167}, publisher = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}}, year = {1967}, url = {https://doi.org/10.1145/1465482.1465508}, doi = {10.1145/1465482.1465508}, timestamp = {Wed, 14 Apr 2021 16:50:07 +0200}, biburl = {https://dblp.org/rec/conf/afips/BarronFHLN67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mtcl/Needham65, author = {Roger M. Needham}, title = {Applications of the theory of clumps}, journal = {Mech. Transl. Comput. Linguistics}, volume = {8}, number = {3-4}, pages = {113--127}, year = {1965}, url = {http://www.mt-archive.info/MT-1965-Needham.pdf}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mtcl/Needham65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Needham63, author = {Roger M. Needham}, title = {Book Review}, journal = {Comput. J.}, volume = {6}, number = {3}, pages = {249}, year = {1963}, url = {https://doi.org/10.1093/comjnl/6.3.249}, doi = {10.1093/COMJNL/6.3.249}, timestamp = {Sat, 01 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Needham63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/Needham62, author = {Roger M. Needham}, title = {A Method for Using Computers in Information Classification}, booktitle = {Information Processing, Proceedings of the 2nd {IFIP} Congress 1962, Munich, Germany, August 27 - September 1, 1962}, pages = {284--287}, publisher = {North-Holland}, year = {1962}, timestamp = {Fri, 26 Jul 2019 12:25:11 +0200}, biburl = {https://dblp.org/rec/conf/ifip/Needham62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Needham61, author = {Roger M. Needham}, title = {Review: Book Review}, journal = {Comput. J.}, volume = {3}, number = {4}, pages = {265}, year = {1961}, url = {https://doi.org/10.1093/comjnl/3.4.265}, doi = {10.1093/COMJNL/3.4.265}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Needham61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Needham61a, author = {Roger M. Needham}, title = {Review: Book Review}, journal = {Comput. J.}, volume = {3}, number = {4}, pages = {265}, year = {1961}, url = {https://doi.org/10.1093/comjnl/3.4.265-a}, doi = {10.1093/COMJNL/3.4.265-A}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Needham61a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/Parker-RhodesN59, author = {A. F. Parker{-}Rhodes and Roger M. Needham}, title = {A reduction method for non-arithmetic data, and its application to thesauric translation}, booktitle = {Information Processing, Proceedings of the 1st International Conference on Information Processing, UNESCO, Paris 15-20 June 1959}, pages = {321--325}, publisher = {{UNESCO} (Paris)}, year = {1959}, timestamp = {Fri, 26 Jul 2019 12:25:09 +0200}, biburl = {https://dblp.org/rec/conf/ifip/Parker-RhodesN59.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.