Back to the Beginning. | 0 | 0.34 | 2002 |
Keynote Address: Mobile Computing versus Immobile Security | 1 | 0.37 | 2001 |
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion) | 0 | 0.34 | 2000 |
Keynote Address: The Changing Environment | 3 | 0.39 | 1999 |
The hardware environment | 0 | 0.34 | 1999 |
A new family of authentication protocols | 77 | 10.37 | 1998 |
Panel Session - Future Directions | 0 | 0.34 | 1998 |
Logic and Over-Simplification | 4 | 0.45 | 1998 |
Prudent engineering practice for cryptographic protocols. | 305 | 38.44 | 1996 |
Robustness Principles for Public Key Protocols | 95 | 18.26 | 1995 |
Storage and synchronization for distributed continuous media | 11 | 2.24 | 1995 |
TEA, a Tiny Encryption Algorithm | 144 | 23.98 | 1994 |
Denial of service: an example | 42 | 13.92 | 1994 |
Pro-tecting poorly chosen secrets from guessing attacks | 29 | 7.27 | 1993 |
Denial of service | 22 | 1.76 | 1993 |
An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? | 4 | 0.41 | 1992 |
Autonet: a high-speed, self-configuring local area network using point-to-point links | 274 | 57.76 | 1991 |
What Next? Some Speculations | 0 | 0.34 | 1991 |
Rejoinder to Nessett | 21 | 3.08 | 1990 |
Reasoning about belief in cryptographic protocols | 309 | 46.28 | 1990 |
Distributed Computing with a Processor Bank | 2 | 0.39 | 1989 |
A logic of authentication | 1192 | 205.60 | 1989 |
Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England | 1 | 1.38 | 1989 |
Reducing risks from poorly chosen keys | 72 | 36.36 | 1989 |
The Scope of a Logic of Authentication. | 5 | 0.58 | 1989 |
Authentication: A Practical Study in Belief and Action | 28 | 19.52 | 1988 |
The Cambridge fast ring networking system | 56 | 45.10 | 1988 |
The Cedar System | 0 | 0.34 | 1988 |
Locks in Distributed Systems - Observations | 0 | 0.34 | 1988 |
Authentication revisited | 68 | 30.16 | 1987 |
A Global Authentication Service without Global Trust. | 53 | 60.38 | 1986 |
On making distributed systems that work | 0 | 0.34 | 1986 |
Current work on authentication | 0 | 0.34 | 1986 |
A caching file system for a programmer's workstation | 51 | 47.32 | 1985 |
The architecture of the universe network | 7 | 6.87 | 1984 |
Experience with Grapevine: the growth of a distributed system | 53 | 36.45 | 1984 |
The use of broadcast techniques on the universe network | 8 | 6.78 | 1984 |
How to connect stable memory to a computer | 11 | 6.64 | 1983 |
The TRIPOS filing machine, a front end to a file server | 5 | 9.49 | 1983 |
Experience with Grapevine: The Growth of a Distributed System (Summary) | 6 | 6.03 | 1983 |
Protection | 0 | 0.34 | 1983 |
Grapevine: an exercise in distributed computing | 168 | 221.21 | 1982 |
Design considerations for a processing server | 0 | 0.34 | 1981 |
Gravevine: An Exercise in Distributed Computing (summary) | 1 | 1.65 | 1981 |
Sequencing computation steps in a network | 1 | 1.48 | 1981 |
The Cambridge Model Distributed System | 17 | 17.88 | 1980 |
Capabilities and Protection | 0 | 0.34 | 1980 |
An asynchronous garbage collector for the Cambridge File Server | 7 | 13.05 | 1980 |
A Universal File Server | 28 | 28.01 | 1980 |
Systems aspects of The Cambridge Ring | 18 | 9.18 | 1979 |