Roger M. Needham
Affiliations:- Microsoft Research
- University of Cambridge, UK
According to our database1,
Roger M. Needham
authored at least 79 papers
between 1959 and 2002.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1994, "".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on cl.cam.ac.uk
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2002
2001
Proceedings of the Security Protocols, 2001
2000
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion).
Proceedings of the Security Protocols, 2000
1999
Proceedings of the Security Protocols, 1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
1998
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998
1997
1996
IEEE Trans. Software Eng., 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
IEEE J. Sel. Areas Commun., 1993
1992
IEEE Ann. Hist. Comput., 1992
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1992
1991
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links.
IEEE J. Sel. Areas Commun., 1991
Proceedings of the Operating Systems of the 90s and Beyond, International Workshop, 1991
1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
1989
Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England.
ACM SIGOPS Oper. Syst. Rev., 1989
Proceedings of the Twelfth ACM Symposium on Operating System Principles, 1989
Proceedings of the Process in Distributed Operating Systems and Distributed Systems Management, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
1988
Locks in Distributed Systems - Observations.
ACM SIGOPS Oper. Syst. Rev., 1988
Authentication: A Practical Study in Belief and Action.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988
1987
1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986
1985
Proceedings of the Tenth ACM Symposium on Operating System Principles, 1985
1984
ACM Trans. Comput. Syst., 1984
1983
Proceedings of the Ninth ACM Symposium on Operating System Principles, 1983
Proceedings of the Ninth ACM Symposium on Operating System Principles, 1983
1982
1981
Proceedings of the Eighth Symposium on Operating System Principles, 1981
Proceedings of the Eighth Symposium on Operating System Principles, 1981
Proceedings of the 8th Annual Symposium on Computer Architecture, 1981
1980
ACM SIGOPS Oper. Syst. Rev., 1980
Proceedings of the GI - 10. Jahrestagung, Saarbrücken, 30. September, 1980
1979
Proceedings of the Seventh Symposium on Operating System Principles, 1979
1978
ACM SIGOPS Oper. Syst. Rev., 1978
Commun. ACM, 1978
1977
Proceedings of the Sixth Symposium on Operating System Principles, 1977
Proceedings of the Sixth Symposium on Operating System Principles, 1977
Proceedings of the Sixth Symposium on Operating System Principles, 1977
1974
1973
1972
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972
1971
Software Engineering Techniques used in the Development of the Cambridge Multiple-Access System.
Softw. Pract. Exp., 1971
Proceedings of the Third Symposium on Operating System Principles, 1971
1969
Proceedings of the Second Symposium on Operating Systems Principles, 1969
1968
1967
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '67 Spring Joint Computer Conference, 1967
1965
1963
1962
A Method for Using Computers in Information Classification.
Proceedings of the Information Processing, Proceedings of the 2nd IFIP Congress 1962, Munich, Germany, August 27, 1962
1961
1959
A reduction method for non-arithmetic data, and its application to thesauric translation.
Proceedings of the Information Processing, 1959