Name
Papers
Collaborators
ROGER M. NEEDHAM
70
58
Citations 
PageRank 
Referers 
4648
2075.99
6263
Referees 
References 
361
275
Search Limit
1001000
Title
Citations
PageRank
Year
Back to the Beginning.00.342002
Keynote Address: Mobile Computing versus Immobile Security10.372001
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion)00.342000
Keynote Address: The Changing Environment30.391999
The hardware environment00.341999
A new family of authentication protocols7710.371998
Panel Session - Future Directions00.341998
Logic and Over-Simplification40.451998
Prudent engineering practice for cryptographic protocols.30538.441996
Robustness Principles for Public Key Protocols9518.261995
Storage and synchronization for distributed continuous media112.241995
TEA, a Tiny Encryption Algorithm14423.981994
Denial of service: an example4213.921994
Pro-tecting poorly chosen secrets from guessing attacks297.271993
Denial of service221.761993
An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia?40.411992
Autonet: a high-speed, self-configuring local area network using point-to-point links27457.761991
What Next? Some Speculations00.341991
Rejoinder to Nessett213.081990
Reasoning about belief in cryptographic protocols30946.281990
Distributed Computing with a Processor Bank20.391989
A logic of authentication1192205.601989
Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England11.381989
Reducing risks from poorly chosen keys7236.361989
The Scope of a Logic of Authentication.50.581989
Authentication: A Practical Study in Belief and Action2819.521988
The Cambridge fast ring networking system5645.101988
The Cedar System00.341988
Locks in Distributed Systems - Observations00.341988
Authentication revisited6830.161987
A Global Authentication Service without Global Trust.5360.381986
On making distributed systems that work00.341986
Current work on authentication00.341986
A caching file system for a programmer's workstation5147.321985
The architecture of the universe network76.871984
Experience with Grapevine: the growth of a distributed system5336.451984
The use of broadcast techniques on the universe network86.781984
How to connect stable memory to a computer116.641983
The TRIPOS filing machine, a front end to a file server59.491983
Experience with Grapevine: The Growth of a Distributed System (Summary)66.031983
Protection00.341983
Grapevine: an exercise in distributed computing168221.211982
Design considerations for a processing server00.341981
Gravevine: An Exercise in Distributed Computing (summary)11.651981
Sequencing computation steps in a network11.481981
The Cambridge Model Distributed System1717.881980
Capabilities and Protection00.341980
An asynchronous garbage collector for the Cambridge File Server713.051980
A Universal File Server2828.011980
Systems aspects of The Cambridge Ring189.181979
  • 1
  • 2