BibTeX records: Roger M. Needham

download as .bib file

@inproceedings{DBLP:conf/spw/Needham02,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {2--4},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_2},
  doi          = {10.1007/978-3-540-39871-4\_2},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02a,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Back to the Beginning},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {242},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_20},
  doi          = {10.1007/978-3-540-39871-4\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham01,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address: Mobile Computing versus Immobile Security},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_1},
  doi          = {10.1007/3-540-45807-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham00,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Keynote Address: Security Protocols and the Swiss Army Knife (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_1},
  doi          = {10.1007/3-540-44810-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Needham99,
  author       = {Roger M. Needham},
  title        = {The Hardware Environment},
  booktitle    = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  USA, May 9-12, 1999},
  pages        = {236},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SECPRI.1999.766918},
  doi          = {10.1109/SECPRI.1999.766918},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Needham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham99,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address: The Changing Environment},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_1},
  doi          = {10.1007/10720107\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/AndersonBCLMN98,
  author       = {Ross J. Anderson and
                  Francesco Bergadano and
                  Bruno Crispo and
                  Jong{-}Hyeon Lee and
                  Charalampos Manifavas and
                  Roger M. Needham},
  title        = {A New Family of Authentication Protocols},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {9--20},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302353},
  doi          = {10.1145/302350.302353},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/AndersonBCLMN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AndersonNS98,
  author       = {Ross J. Anderson and
                  Roger M. Needham and
                  Adi Shamir},
  editor       = {David Aucsmith},
  title        = {The Steganographic File System},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {73--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_6},
  doi          = {10.1007/3-540-49380-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AndersonNS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Needham98,
  author       = {Roger M. Needham},
  title        = {Logic and Over-Simplification},
  booktitle    = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
                  Indiana, USA, June 21-24, 1998},
  pages        = {2--3},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/LICS.1998.705638},
  doi          = {10.1109/LICS.1998.705638},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Needham98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NeedhamLFGC98,
  author       = {Roger M. Needham and
                  E. Stewart Lee and
                  Joan Feigenbaum and
                  Virgil D. Gligor and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Panel Session - Future Directions},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {227--239},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_31},
  doi          = {10.1007/3-540-49135-X\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Needham97,
  author       = {Roger M. Needham},
  title        = {The changing environment for security protocols},
  journal      = {{IEEE} Netw.},
  volume       = {11},
  number       = {3},
  pages        = {12--15},
  year         = {1997},
  url          = {https://doi.org/10.1109/65.587044},
  doi          = {10.1109/65.587044},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/Needham97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AbadiN96,
  author       = {Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Prudent Engineering Practice for Cryptographic Protocols},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {1},
  pages        = {6--15},
  year         = {1996},
  url          = {https://doi.org/10.1109/32.481513},
  doi          = {10.1109/32.481513},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AbadiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/JardetzkySN95,
  author       = {Paul W. Jardetzky and
                  Cormac J. Sreenan and
                  Roger M. Needham},
  title        = {Storage and Synchronization for Distributed Continuous Media},
  journal      = {Multim. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {151--161},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF02176236},
  doi          = {10.1007/BF02176236},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/JardetzkySN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AndersonN95,
  author       = {Ross J. Anderson and
                  Roger M. Needham},
  editor       = {Don Coppersmith},
  title        = {Robustness Principles for Public Key Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {236--247},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_19},
  doi          = {10.1007/3-540-44750-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AndersonN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/cstoday95/AndersonN95,
  author       = {Ross J. Anderson and
                  Roger M. Needham},
  editor       = {Jan van Leeuwen},
  title        = {Programming Satan's Computer},
  booktitle    = {Computer Science Today: Recent Trends and Developments},
  series       = {Lecture Notes in Computer Science},
  volume       = {1000},
  pages        = {426--440},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0015258},
  doi          = {10.1007/BFB0015258},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/books/sp/cstoday95/AndersonN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Needham94,
  author       = {Roger M. Needham},
  title        = {Denail of Service: An Example},
  journal      = {Commun. {ACM}},
  volume       = {37},
  number       = {11},
  pages        = {42--46},
  year         = {1994},
  url          = {https://doi.org/10.1145/188280.188294},
  doi          = {10.1145/188280.188294},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Needham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WheelerN94,
  author       = {David J. Wheeler and
                  Roger M. Needham},
  editor       = {Bart Preneel},
  title        = {TEA, a Tiny Encryption Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {363--366},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_29},
  doi          = {10.1007/3-540-60590-8\_29},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WheelerN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbadiN94,
  author       = {Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Prudent engineering practice for cryptographic protocols},
  booktitle    = {1994 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/RISP.1994.296587},
  doi          = {10.1109/RISP.1994.296587},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbadiN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongLNS93,
  author       = {Li Gong and
                  T. Mark A. Lomas and
                  Roger M. Needham and
                  Jerome H. Saltzer},
  title        = {Protecting Poorly Chosen Secrets from Guessing Attacks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {648--656},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223865},
  doi          = {10.1109/49.223865},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GongLNS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Needham93,
  author       = {Roger M. Needham},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Denial of Service},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {151--153},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168607},
  doi          = {10.1145/168588.168607},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Needham93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/annals/Needham92,
  author       = {Roger M. Needham},
  title        = {Later Developments at Cambridge: Titan, Cap, and the Cambridge Ring},
  journal      = {{IEEE} Ann. Hist. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {57--58},
  year         = {1992},
  url          = {https://doi.org/10.1109/85.194056},
  doi          = {10.1109/85.194056},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/annals/Needham92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nossdav/NeedhamN92,
  author       = {Roger M. Needham and
                  Akira Nakamura},
  editor       = {P. Venkat Rangan},
  title        = {An Approach to Real-time Scheduling - but is it Really a Problem for
                  Multimedia?},
  booktitle    = {Network and Operating System Support for Digital Audio and Video,
                  Third International Workshop, La Jolla, California, USA, November
                  12-13, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {712},
  pages        = {32--39},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57183-3\_4},
  doi          = {10.1007/3-540-57183-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/nossdav/NeedhamN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SchroederBBMNRST91,
  author       = {Michael D. Schroeder and
                  Andrew Birrell and
                  Michael Burrows and
                  Hal Murray and
                  Roger M. Needham and
                  Thomas L. Rodeheffer and
                  Edwin H. Satterthwaite and
                  Charles P. Thacker},
  title        = {Autonet: {A} High-Speed, Self-Configuring Local Area Network Using
                  Point-to-Point Links},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {9},
  number       = {8},
  pages        = {1318--1335},
  year         = {1991},
  url          = {https://doi.org/10.1109/49.105178},
  doi          = {10.1109/49.105178},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SchroederBBMNRST91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Needham91,
  author       = {Roger M. Needham},
  editor       = {Arthur I. Karshmer and
                  J{\"{u}}rgen Nehmer},
  title        = {What Next? Some Speculations},
  booktitle    = {Operating Systems of the 90s and Beyond, International Workshop, Dagstuhl
                  Castle, Germany, July 8-12, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {563},
  pages        = {220--222},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0024547},
  doi          = {10.1007/BFB0024547},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Needham91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BurrowsAN90,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Rejoinder to Nessett},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {24},
  number       = {2},
  pages        = {39--40},
  year         = {1990},
  url          = {https://doi.org/10.1145/382258.382790},
  doi          = {10.1145/382258.382790},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BurrowsAN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BurrowsAN90,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {A Logic of Authentication},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {18--36},
  year         = {1990},
  url          = {https://doi.org/10.1145/77648.77649},
  doi          = {10.1145/77648.77649},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/BurrowsAN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cassp/Needham90,
  author       = {Roger M. Needham},
  editor       = {John Rosenberg and
                  J. Leslie Keedy},
  title        = {Capabilities and Security},
  booktitle    = {Security and Persistence, Proceedings of the International Workshop
                  on Computer Architectures to Support Security and Persistence of Information
                  8-11 May 1990, Bremen, West Germany},
  series       = {Workshops in Computing},
  pages        = {3--8},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/978-1-4471-3178-6\_1},
  doi          = {10.1007/978-1-4471-3178-6\_1},
  timestamp    = {Wed, 06 Apr 2022 08:42:11 +0200},
  biburl       = {https://dblp.org/rec/conf/cassp/Needham90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GongNY90,
  author       = {Li Gong and
                  Roger M. Needham and
                  Raphael Yahalom},
  title        = {Reasoning about Belief in Cryptographic Protocols},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {234--248},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63854},
  doi          = {10.1109/RISP.1990.63854},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GongNY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamH89,
  author       = {Roger M. Needham and
                  Andrew Herbert},
  title        = {Report on the Third European {SIGOPS} Workshop "Autonomy or Interdependence
                  in Distributed Systems", September 19-21, 1988, Ca, bridge, England},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {3--19},
  year         = {1989},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/NeedhamH89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurrowsAN89,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {The Scope of a Logic of Authentication},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {119--126},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/07},
  doi          = {10.1090/DIMACS/002/07},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdos/BaconLN89,
  author       = {Jean Bacon and
                  Ian M. Leslie and
                  Roger M. Needham},
  editor       = {Wolfgang Schr{\"{o}}der{-}Preikschat and
                  Wolfgang Zimmer},
  title        = {Distributed Computing with a Processor Bank},
  booktitle    = {Process in Distributed Operating Systems and Distributed Systems Management,
                  European Workshop, Berlin, Germany, April 18-19, 1889},
  series       = {Lecture Notes in Computer Science},
  volume       = {433},
  pages        = {147--161},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-52609-9\_82},
  doi          = {10.1007/3-540-52609-9\_82},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/pdos/BaconLN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BurrowsAN89,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Gregory R. Andrews},
  title        = {A Logic of Authentication},
  booktitle    = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
                  1989},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/74850.74852},
  doi          = {10.1145/74850.74852},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/BurrowsAN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LomasGSN89,
  author       = {T. Mark A. Lomas and
                  Li Gong and
                  Jerome H. Saltzer and
                  Roger M. Needham},
  editor       = {Gregory R. Andrews},
  title        = {Reducing Risks from Poorly Chosen Keys},
  booktitle    = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
                  1989},
  pages        = {14--18},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/74850.74853},
  doi          = {10.1145/74850.74853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/LomasGSN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GiffordNS88,
  author       = {David K. Gifford and
                  Roger M. Needham and
                  Michael D. Schroeder},
  title        = {The Cedar System},
  journal      = {Commun. {ACM}},
  volume       = {31},
  number       = {3},
  pages        = {288--298},
  year         = {1988},
  url          = {https://doi.org/10.1145/42392.42398},
  doi          = {10.1145/42392.42398},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GiffordNS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamB88,
  author       = {Roger M. Needham and
                  Michael Burrows},
  title        = {Locks in Distributed Systems - Observations},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {44},
  year         = {1988},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/NeedhamB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HopperN88,
  author       = {Andrew Hopper and
                  Roger M. Needham},
  title        = {The Cambridge Fast Ring Networking System},
  journal      = {{IEEE} Trans. Computers},
  volume       = {37},
  number       = {10},
  pages        = {1214--1223},
  year         = {1988},
  url          = {https://doi.org/10.1109/12.5983},
  doi          = {10.1109/12.5983},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HopperN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tark/BurrowsAN88,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Moshe Y. Vardi},
  title        = {Authentication: {A} Practical Study in Belief and Action},
  booktitle    = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning
                  about Knowledge, Pacific Grove, CA, USA, March 1988},
  pages        = {325--342},
  publisher    = {Morgan Kaufmann},
  year         = {1988},
  timestamp    = {Thu, 21 Jun 2018 07:50:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tark/BurrowsAN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamS87,
  author       = {Roger M. Needham and
                  Michael D. Schroeder},
  title        = {Authentication Revisited},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {21},
  number       = {1},
  pages        = {7},
  year         = {1987},
  url          = {https://doi.org/10.1145/24592.24593},
  doi          = {10.1145/24592.24593},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/NeedhamS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/BirrellLNS86,
  author       = {Andrew Birrell and
                  Butler W. Lampson and
                  Roger M. Needham and
                  Michael D. Schroeder},
  title        = {Current work on authentication},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam,
                  Netherlands, September 8-10, 1986},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/503956.503966},
  doi          = {10.1145/503956.503966},
  timestamp    = {Thu, 07 Nov 2019 10:24:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sigopsE/BirrellLNS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/Needham86,
  author       = {Roger M. Needham},
  title        = {On making distributed systems that work},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam,
                  Netherlands, September 8-10, 1986},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/503956.503993},
  doi          = {10.1145/503956.503993},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigopsE/Needham86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BirrellLNS86,
  author       = {Andrew Birrell and
                  Butler W. Lampson and
                  Roger M. Needham and
                  Michael D. Schroeder},
  title        = {A Global Authentication Service without Global Trust},
  booktitle    = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 7-9, 1986},
  pages        = {223--230},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  url          = {https://doi.org/10.1109/SP.1986.10009},
  doi          = {10.1109/SP.1986.10009},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BirrellLNS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SchroederGN85,
  author       = {Michael D. Schroeder and
                  David K. Gifford and
                  Roger M. Needham},
  editor       = {Forest Baskett and
                  Andrew Birrell and
                  David R. Cheriton},
  title        = {A Caching File System For a Programmer's Workstation},
  booktitle    = {Proceedings of the Tenth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1985, Orcas Island, Washington, USA, December 1-4, 1985},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {1985},
  url          = {https://doi.org/10.1145/323647.323632},
  doi          = {10.1145/323647.323632},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/SchroederGN85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/LeslieNBA84,
  author       = {Ian M. Leslie and
                  Roger M. Needham and
                  John W. Burren and
                  Graham C. Adams},
  title        = {The architecture of the universe network},
  journal      = {Comput. Commun. Rev.},
  volume       = {14},
  number       = {2},
  pages        = {2--9},
  year         = {1984},
  url          = {https://doi.org/10.1145/800056.802053},
  doi          = {10.1145/800056.802053},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/LeslieNBA84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/WatersALN84,
  author       = {A. Gill Waters and
                  Christopher J. Adams and
                  Ian M. Leslie and
                  Roger M. Needham},
  title        = {The use of broadcast techniques on the universe network},
  journal      = {Comput. Commun. Rev.},
  volume       = {14},
  number       = {2},
  pages        = {52--57},
  year         = {1984},
  url          = {https://doi.org/10.1145/800056.802059},
  doi          = {10.1145/800056.802059},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/WatersALN84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/SchroederBN84,
  author       = {Michael D. Schroeder and
                  Andrew Birrell and
                  Roger M. Needham},
  title        = {Experience with Grapevine: The Growth of a Distributed System},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {3--23},
  year         = {1984},
  url          = {https://doi.org/10.1145/2080.2081},
  doi          = {10.1145/2080.2081},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/SchroederBN84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamHM83,
  author       = {Roger M. Needham and
                  A. J. Herbert and
                  James G. Mitchell},
  title        = {How to Connect Stable Memory to a Computer},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {17},
  number       = {1},
  pages        = {16},
  year         = {1983},
  url          = {https://doi.org/10.1145/850733.850736},
  doi          = {10.1145/850733.850736},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/NeedhamHM83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Needham83,
  author       = {Roger M. Needham},
  editor       = {David Hutchison and
                  John A. Mariani and
                  Doug Shepherd},
  title        = {Protection},
  booktitle    = {Local Area Networks: An Advanced Course, Glasgow, UK, July 11-22,
                  1983, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {184},
  pages        = {260--281},
  publisher    = {Springer},
  year         = {1983},
  url          = {https://doi.org/10.1007/3-540-15191-5\_23},
  doi          = {10.1007/3-540-15191-5\_23},
  timestamp    = {Mon, 26 Sep 2022 16:14:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Needham83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/RichardsonN83,
  author       = {M. F. Richardson and
                  Roger M. Needham},
  editor       = {Jerome H. Saltzer and
                  Roy Levin and
                  David D. Redell},
  title        = {The {TRIPOS} Filing Machine, a Front End to a File Server},
  booktitle    = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983},
  pages        = {120--128},
  publisher    = {{ACM}},
  year         = {1983},
  url          = {https://doi.org/10.1145/800217.806620},
  doi          = {10.1145/800217.806620},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/RichardsonN83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SchroederBN83,
  author       = {Michael D. Schroeder and
                  Andrew Birrell and
                  Roger M. Needham},
  editor       = {Jerome H. Saltzer and
                  Roy Levin and
                  David D. Redell},
  title        = {Experience with Grapevine: The Growth of a Distributed System (Summary)},
  booktitle    = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983},
  pages        = {141--142},
  publisher    = {{ACM}},
  year         = {1983},
  url          = {https://doi.org/10.1145/800217.806622},
  doi          = {10.1145/800217.806622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/SchroederBN83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BirrellLNS82,
  author       = {Andrew Birrell and
                  Roy Levin and
                  Roger M. Needham and
                  Michael D. Schroeder},
  title        = {Grapevine: An Exercise in Distributed Computing},
  journal      = {Commun. {ACM}},
  volume       = {25},
  number       = {4},
  pages        = {260--274},
  year         = {1982},
  url          = {https://doi.org/10.1145/358468.358487},
  doi          = {10.1145/358468.358487},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BirrellLNS82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/Needham81,
  author       = {Roger M. Needham},
  editor       = {Richard Y. Kain and
                  William R. Franta},
  title        = {Design Considerations for a Processing Server},
  booktitle    = {Proceedings of the 8th Annual Symposium on Computer Architecture,
                  Minneapolis, MN, USA, May 1981},
  pages        = {501--504},
  publisher    = {{IEEE} Computer Society},
  year         = {1981},
  url          = {http://dl.acm.org/citation.cfm?id=801900},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/Needham81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/HerbertN81,
  author       = {A. J. Herbert and
                  Roger M. Needham},
  editor       = {John Howard and
                  David P. Reed},
  title        = {Sequencing Computation Steps in a Network},
  booktitle    = {Proceedings of the Eighth Symposium on Operating System Principles,
                  {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California,
                  USA, December 14-16, 1981},
  pages        = {59--63},
  publisher    = {{ACM}},
  year         = {1981},
  url          = {https://doi.org/10.1145/800216.806592},
  doi          = {10.1145/800216.806592},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/HerbertN81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BirrellLNS81,
  author       = {Andrew Birrell and
                  Roy Levin and
                  Roger M. Needham and
                  Michael D. Schroeder},
  editor       = {John Howard and
                  David P. Reed},
  title        = {Gravevine: An Exercise in Distributed Computing (summary)},
  booktitle    = {Proceedings of the Eighth Symposium on Operating System Principles,
                  {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California,
                  USA, December 14-16, 1981},
  pages        = {178--179},
  publisher    = {{ACM}},
  year         = {1981},
  url          = {https://doi.org/10.1145/800216.806606},
  doi          = {10.1145/800216.806606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/BirrellLNS81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/WilkesN80,
  author       = {Maurice V. Wilkes and
                  Roger M. Needham},
  title        = {The Cambridge Model Distributed System},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {14},
  number       = {1},
  pages        = {21--29},
  year         = {1980},
  url          = {https://doi.org/10.1145/850693.850695},
  doi          = {10.1145/850693.850695},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/WilkesN80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/GarnettN80,
  author       = {N. H. Garnett and
                  Roger M. Needham},
  title        = {An Asynchronous Garbage Collector for the Cambridge File Server},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {14},
  number       = {4},
  pages        = {36--40},
  year         = {1980},
  url          = {https://doi.org/10.1145/850708.850711},
  doi          = {10.1145/850708.850711},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/GarnettN80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BirrellN80,
  author       = {Andrew Birrell and
                  Roger M. Needham},
  title        = {A Universal File Server},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {6},
  number       = {5},
  pages        = {450--453},
  year         = {1980},
  url          = {https://doi.org/10.1109/TSE.1980.230493},
  doi          = {10.1109/TSE.1980.230493},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BirrellN80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/Needham80,
  author       = {Roger M. Needham},
  editor       = {Reinhard Wilhelm},
  title        = {Capabilities and Protection},
  booktitle    = {{GI} - 10. Jahrestagung, Saarbr{\"{u}}cken, 30. September - 2.
                  Oktober 1980, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {33},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {1980},
  url          = {https://doi.org/10.1007/978-3-642-67838-7\_3},
  doi          = {10.1007/978-3-642-67838-7\_3},
  timestamp    = {Tue, 23 May 2017 01:10:33 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Needham80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Needham79,
  author       = {Roger M. Needham},
  title        = {Adding Capability to Conventional File Servers},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {3--4},
  year         = {1979},
  url          = {https://doi.org/10.1145/850652.850653},
  doi          = {10.1145/850652.850653},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Needham79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LauerN79,
  author       = {Hugh C. Lauer and
                  Roger M. Needham},
  title        = {On the Duality of Operating System Structures},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {3--19},
  year         = {1979},
  url          = {https://doi.org/10.1145/850657.850658},
  doi          = {10.1145/850657.850658},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/LauerN79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham79,
  author       = {Roger M. Needham},
  editor       = {Michael D. Schroeder and
                  Anita K. Jones},
  title        = {Systems Aspects of the Cambridge Ring},
  booktitle    = {Proceedings of the Seventh Symposium on Operating System Principles,
                  {SOSP} 1979, Asilomar Conference Grounds, Pacific Grove, California,
                  USA, 10-12, December 1979},
  pages        = {82--85},
  publisher    = {{ACM}},
  year         = {1979},
  url          = {https://doi.org/10.1145/800215.806573},
  doi          = {10.1145/800215.806573},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/Needham79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/NeedhamS78,
  author       = {Roger M. Needham and
                  Michael D. Schroeder},
  title        = {Using Encryption for Authentication in Large Networks of Computers},
  journal      = {Commun. {ACM}},
  volume       = {21},
  number       = {12},
  pages        = {993--999},
  year         = {1978},
  url          = {https://doi.org/10.1145/359657.359659},
  doi          = {10.1145/359657.359659},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/NeedhamS78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BirrellN78,
  author       = {Andrew Birrell and
                  Roger M. Needham},
  title        = {An Asynchronous Garbage Collector for the {CAP} Filing System},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {31--33},
  year         = {1978},
  url          = {https://doi.org/10.1145/775332.775338},
  doi          = {10.1145/775332.775338},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BirrellN78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BirrellN78a,
  author       = {Andrew Birrell and
                  Roger M. Needham},
  title        = {Character Streams},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {29--31},
  year         = {1978},
  url          = {https://doi.org/10.1145/775396.775399},
  doi          = {10.1145/775396.775399},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BirrellN78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamW77,
  author       = {Roger M. Needham and
                  R. D. H. Walker},
  editor       = {Saul Rosen and
                  Peter J. Denning},
  title        = {The Cambridge {CAP} Computer and its Protection System},
  booktitle    = {Proceedings of the Sixth Symposium on Operating System Principles,
                  {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
                  16-18, 1977},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {1977},
  url          = {https://doi.org/10.1145/800214.806541},
  doi          = {10.1145/800214.806541},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/NeedhamW77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamB77,
  author       = {Roger M. Needham and
                  Andrew Birrell},
  editor       = {Saul Rosen and
                  Peter J. Denning},
  title        = {The Cap Filing System},
  booktitle    = {Proceedings of the Sixth Symposium on Operating System Principles,
                  {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
                  16-18, 1977},
  pages        = {11--16},
  publisher    = {{ACM}},
  year         = {1977},
  url          = {https://doi.org/10.1145/800214.806542},
  doi          = {10.1145/800214.806542},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/NeedhamB77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham77,
  author       = {Roger M. Needham},
  editor       = {Saul Rosen and
                  Peter J. Denning},
  title        = {The {CAP} Project - An Interim Evaluation},
  booktitle    = {Proceedings of the Sixth Symposium on Operating System Principles,
                  {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
                  16-18, 1977},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {1977},
  url          = {https://doi.org/10.1145/800214.806543},
  doi          = {10.1145/800214.806543},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/Needham77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NeedhamW74,
  author       = {Roger M. Needham and
                  Maurice V. Wilkes},
  title        = {Domains of Protection and the Management of Processes},
  journal      = {Comput. J.},
  volume       = {17},
  number       = {2},
  pages        = {117--120},
  year         = {1974},
  url          = {https://doi.org/10.1093/comjnl/17.2.117},
  doi          = {10.1093/COMJNL/17.2.117},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/NeedhamW74.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/Needham73,
  author       = {Roger M. Needham},
  title        = {Note on evaluation},
  journal      = {Inf. Storage Retr.},
  volume       = {9},
  number       = {8},
  pages        = {474},
  year         = {1973},
  url          = {https://doi.org/10.1016/0020-0271(73)90098-3},
  doi          = {10.1016/0020-0271(73)90098-3},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/Needham73.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/Needham72,
  author       = {Roger M. Needham},
  title        = {Protection systems and protection implementations},
  booktitle    = {American Federation of Information Processing Societies: Proceedings
                  of the {AFIPS} '72 Fall Joint Computer Conference, December 5-7, 1972,
                  Anaheim, California, {USA} - Part {I}},
  series       = {{AFIPS} Conference Proceedings},
  volume       = {41},
  pages        = {571--578},
  publisher    = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}},
  year         = {1972},
  url          = {https://doi.org/10.1145/1479992.1480073},
  doi          = {10.1145/1479992.1480073},
  timestamp    = {Wed, 14 Apr 2021 16:50:07 +0200},
  biburl       = {https://dblp.org/rec/conf/afips/Needham72.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/LandyN71,
  author       = {B. Landy and
                  Roger M. Needham},
  title        = {Software Engineering Techniques used in the Development of the Cambridge
                  Multiple-Access System},
  journal      = {Softw. Pract. Exp.},
  volume       = {1},
  number       = {2},
  pages        = {167--173},
  year         = {1971},
  url          = {https://doi.org/10.1002/spe.4380010207},
  doi          = {10.1002/SPE.4380010207},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/LandyN71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham71,
  author       = {Roger M. Needham},
  editor       = {Edward J. McCluskey and
                  Nicholas A. Fortis and
                  Butler W. Lampson and
                  Thomas H. Bredt},
  title        = {Handling Difficult Faults in Operating Systems},
  booktitle    = {Proceedings of the Third Symposium on Operating System Principles,
                  {SOSP} 1971, Stanford University, Palo Alto, California, USA, October
                  18-20, 1971},
  pages        = {55--57},
  publisher    = {{ACM}},
  year         = {1971},
  url          = {https://doi.org/10.1145/800212.806499},
  doi          = {10.1145/800212.806499},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/Needham71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamH69,
  author       = {Roger M. Needham and
                  David F. Hartley},
  editor       = {Peter J. Denning and
                  Edward G. Coffman Jr.},
  title        = {Theory and practice in operating system design},
  booktitle    = {Proceedings of the Second Symposium on Operating Systems Principles,
                  {SOSP} 1969, Princeton, NJ, USA, October 20-22, 1969},
  pages        = {8--12},
  publisher    = {{ACM}},
  year         = {1969},
  url          = {https://doi.org/10.1145/961053.961058},
  doi          = {10.1145/961053.961058},
  timestamp    = {Mon, 13 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sosp/NeedhamH69.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WilkesN68,
  author       = {Maurice V. Wilkes and
                  Roger M. Needham},
  title        = {The Design of Multiple-Access Computer Systems: Part 2},
  journal      = {Comput. J.},
  volume       = {10},
  number       = {4},
  pages        = {315--320},
  year         = {1968},
  url          = {https://doi.org/10.1093/comjnl/10.4.315},
  doi          = {10.1093/COMJNL/10.4.315},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WilkesN68.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HartleyLN68,
  author       = {David F. Hartley and
                  B. Landy and
                  Roger M. Needham},
  title        = {The structure of a multiprogramming supervisor},
  journal      = {Comput. J.},
  volume       = {11},
  number       = {3},
  pages        = {247--255},
  year         = {1968},
  url          = {https://doi.org/10.1093/comjnl/11.3.247},
  doi          = {10.1093/COMJNL/11.3.247},
  timestamp    = {Mon, 13 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HartleyLN68.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/JonesN68,
  author       = {Karen Sparck Jones and
                  Roger M. Needham},
  title        = {Automatic term classifications and retrieval},
  journal      = {Inf. Storage Retr.},
  volume       = {4},
  number       = {2},
  pages        = {91--100},
  year         = {1968},
  url          = {https://doi.org/10.1016/0020-0271(68)90013-2},
  doi          = {10.1016/0020-0271(68)90013-2},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/JonesN68.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/BarronFHLN67,
  author       = {David W. Barron and
                  A. G. Fraser and
                  David F. Hartley and
                  B. Landy and
                  Roger M. Needham},
  title        = {File handling at Cambridge University},
  booktitle    = {American Federation of Information Processing Societies: Proceedings
                  of the {AFIPS} '67 Spring Joint Computer Conference, April 18-20,
                  1967, Atlantic City, New Jersey, {USA}},
  series       = {{AFIPS} Conference Proceedings},
  volume       = {30},
  pages        = {163--167},
  publisher    = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}},
  year         = {1967},
  url          = {https://doi.org/10.1145/1465482.1465508},
  doi          = {10.1145/1465482.1465508},
  timestamp    = {Wed, 14 Apr 2021 16:50:07 +0200},
  biburl       = {https://dblp.org/rec/conf/afips/BarronFHLN67.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mtcl/Needham65,
  author       = {Roger M. Needham},
  title        = {Applications of the theory of clumps},
  journal      = {Mech. Transl. Comput. Linguistics},
  volume       = {8},
  number       = {3-4},
  pages        = {113--127},
  year         = {1965},
  url          = {http://www.mt-archive.info/MT-1965-Needham.pdf},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mtcl/Needham65.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Needham63,
  author       = {Roger M. Needham},
  title        = {Book Review},
  journal      = {Comput. J.},
  volume       = {6},
  number       = {3},
  pages        = {249},
  year         = {1963},
  url          = {https://doi.org/10.1093/comjnl/6.3.249},
  doi          = {10.1093/COMJNL/6.3.249},
  timestamp    = {Sat, 01 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Needham63.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Needham62,
  author       = {Roger M. Needham},
  title        = {A Method for Using Computers in Information Classification},
  booktitle    = {Information Processing, Proceedings of the 2nd {IFIP} Congress 1962,
                  Munich, Germany, August 27 - September 1, 1962},
  pages        = {284--287},
  publisher    = {North-Holland},
  year         = {1962},
  timestamp    = {Fri, 26 Jul 2019 12:25:11 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/Needham62.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Needham61,
  author       = {Roger M. Needham},
  title        = {Review: Book Review},
  journal      = {Comput. J.},
  volume       = {3},
  number       = {4},
  pages        = {265},
  year         = {1961},
  url          = {https://doi.org/10.1093/comjnl/3.4.265},
  doi          = {10.1093/COMJNL/3.4.265},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Needham61.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Needham61a,
  author       = {Roger M. Needham},
  title        = {Review: Book Review},
  journal      = {Comput. J.},
  volume       = {3},
  number       = {4},
  pages        = {265},
  year         = {1961},
  url          = {https://doi.org/10.1093/comjnl/3.4.265-a},
  doi          = {10.1093/COMJNL/3.4.265-A},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Needham61a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Parker-RhodesN59,
  author       = {A. F. Parker{-}Rhodes and
                  Roger M. Needham},
  title        = {A reduction method for non-arithmetic data, and its application to
                  thesauric translation},
  booktitle    = {Information Processing, Proceedings of the 1st International Conference
                  on Information Processing, UNESCO, Paris 15-20 June 1959},
  pages        = {321--325},
  publisher    = {{UNESCO} (Paris)},
  year         = {1959},
  timestamp    = {Fri, 26 Jul 2019 12:25:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/Parker-RhodesN59.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics