Roger Needham

Results: 19



#Item
1The least privacy-damaging centralised traffic data retention architecture (Extended abstract) George Danezis Microsoft Research Cambridge, Roger Needham Building,

The least privacy-damaging centralised traffic data retention architecture (Extended abstract) George Danezis Microsoft Research Cambridge, Roger Needham Building,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
2Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG  Abstract. Cryptographic protocols are used in distributed systems to

Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2006-07-26 10:17:27
    3Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center

    Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English
    4Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:

    Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:

    Add to Reading List

    Source URL: roxanageambasu.github.io

    Language: English - Date: 2016-04-03 19:38:14
    5Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995  Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

    Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995 Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

    Add to Reading List

    Source URL: users.ece.cmu.edu

    - Date: 2004-09-25 11:38:53
      6About the Author  Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien

      About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2008-04-27 09:36:59
      7TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

      TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

      Add to Reading List

      Source URL: www.movable-type.co.uk

      Language: English - Date: 2009-06-02 07:28:40
      8MarchRoger Michael Needham _____________________ BornDied

      MarchRoger Michael Needham _____________________ BornDied

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2003-03-19 08:00:58
      9ROGER NEEDHAMThis biographical note was prepared for a meeting to celebrate Roger Needham’s fifty years in Cambridge and five years at Microsoft Research Limited, held on 17th FebruaryFor further de

      ROGER NEEDHAMThis biographical note was prepared for a meeting to celebrate Roger Needham’s fifty years in Cambridge and five years at Microsoft Research Limited, held on 17th FebruaryFor further de

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2003-03-10 07:16:43
      10© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

      © IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

      Add to Reading List

      Source URL: web.mit.edu

      Language: English - Date: 2011-05-18 00:11:55