1![The least privacy-damaging centralised traffic data retention architecture (Extended abstract) George Danezis Microsoft Research Cambridge, Roger Needham Building, The least privacy-damaging centralised traffic data retention architecture (Extended abstract) George Danezis Microsoft Research Cambridge, Roger Needham Building,](https://www.pdfsearch.io/img/27f3c021f8146a57fda2ed8211d6dc13.jpg) | Add to Reading ListSource URL: www0.cs.ucl.ac.ukLanguage: English - Date: 2013-10-10 06:48:59
|
---|
2![Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to](https://www.pdfsearch.io/img/a665fa126ab6930c44bb81c614958c93.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.uk- Date: 2006-07-26 10:17:27
|
---|
3![Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center](https://www.pdfsearch.io/img/659794941d675411be6cd366faa4efbe.jpg) | Add to Reading ListSource URL: www.eecs.harvard.eduLanguage: English |
---|
4![Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice: Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:](https://www.pdfsearch.io/img/38a7eefba1c1b5a7b204134bb4f32260.jpg) | Add to Reading ListSource URL: roxanageambasu.github.ioLanguage: English - Date: 2016-04-03 19:38:14
|
---|
5![Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995
Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995
Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA](https://www.pdfsearch.io/img/3960974efcd9286e9a1680f6eb3a4c1b.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2004-09-25 11:38:53
|
---|
6![About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien](https://www.pdfsearch.io/img/656de0205d6b605d6fee04f7980269fe.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2008-04-27 09:36:59
|
---|
7![TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England](https://www.pdfsearch.io/img/37dd641035bc59bf6659c0f663a7a356.jpg) | Add to Reading ListSource URL: www.movable-type.co.ukLanguage: English - Date: 2009-06-02 07:28:40
|
---|
8![MarchRoger Michael Needham _____________________ BornDied MarchRoger Michael Needham _____________________ BornDied](https://www.pdfsearch.io/img/91138b2d92d283263176057a7c6563a9.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2003-03-19 08:00:58
|
---|
9![ROGER NEEDHAMThis biographical note was prepared for a meeting to celebrate Roger Needham’s fifty years in Cambridge and five years at Microsoft Research Limited, held on 17th FebruaryFor further de ROGER NEEDHAMThis biographical note was prepared for a meeting to celebrate Roger Needham’s fifty years in Cambridge and five years at Microsoft Research Limited, held on 17th FebruaryFor further de](https://www.pdfsearch.io/img/441fc5fcb0f57092c9660dee0f678e67.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2003-03-10 07:16:43
|
---|
10![© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993 © IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993](https://www.pdfsearch.io/img/e8d8bb7dfaa00fe4d69433b0f107225f.jpg) | Add to Reading ListSource URL: web.mit.eduLanguage: English - Date: 2011-05-18 00:11:55
|
---|