Edward Wobber
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
1990 – 1999
- 1999
- [c7]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. Secure Internet Programming 1999: 395-412 - 1998
- [j5]Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber:
Secure Web Tunneling. Computer Networks 30(1-7): 531-539 (1998) - 1997
- [j4]Kenneth F. Alden, Edward Wobber:
The AltaVista Tunnel Using the Internet to Extend Corporate Networks. Digital Technical Journal 9(2) (1997) - 1996
- [c6]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221 - 1995
- [j3]Andrew Birrell, Greg Nelson, Susan S. Owicki, Edward Wobber:
Network Objects. Softw., Pract. Exper. 25(S4): S4 (1995) - 1994
- [j2]Edward Wobber, Martín Abadi, Michael Burrows:
Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) - 1993
- [c5]
- [c4]Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson:
Authentication in the Taos Operating System. SOSP 1993: 256-269 - 1992
- [j1]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992) - 1991
- [c3]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182 - 1990
- [c2]Francis J. Prusker, Edward Wobber:
The Siphon: Managing Distant Replicated Repositories. Workshop on the Management of Replicated Data 1990: 44-47
1980 – 1989
- 1987
- [c1]Andrew Birrell, Michael B. Jones, Edward Wobber:
A Simple and Efficient Implementation for Small Databases. SOSP 1987: 149-154
Coauthor Index
last updated on 2019-01-09 01:29 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint