Roger Needham

Results: 19



#Item
1Prevention / Learning / Government / Human rights / Crime prevention / Law enforcement / National security / Security / Data retention / Internet privacy / Mass surveillance / Computer network

The least privacy-damaging centralised traffic data retention architecture (Extended abstract) George Danezis Microsoft Research Cambridge, Roger Needham Building,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
2

Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2006-07-26 10:17:27
    3Server / Server hardware / Email / File server / Internet Relay Chat / Session / Domain Name System / Publishsubscribe pattern

    Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English
    4Computing / Software / System administration / USENIX / Unix / Salvatore J. Stolfo / Roger Needham / Cloud computing / Internet privacy / Big data

    Roxana Geambasu Columbia University Department of Computer Science 1214 Amsterdam Avenue, New York, NYOffice:

    Add to Reading List

    Source URL: roxanageambasu.github.io

    Language: English - Date: 2016-04-03 19:38:14
    5

    Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995 Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

    Add to Reading List

    Source URL: users.ece.cmu.edu

    - Date: 2004-09-25 11:38:53
      6Cryptography / Science / Technology / Knowledge / Fellows of the Royal Society / Roger Needham / Locksmithing

      About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2008-04-27 09:36:59
      7University of Cambridge Computer Laboratory / Data Encryption Standard / ICE / Bitwise operation / XXTEA / Cryptographic hash functions / XTEA / Cryptography / Binary arithmetic / Tiny Encryption Algorithm

      TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

      Add to Reading List

      Source URL: www.movable-type.co.uk

      Language: English - Date: 2009-06-02 07:28:40
      8Science and technology in the United Kingdom / University of Cambridge / Roger Needham / Andy Hopper / Jon Crowcroft / Fellows of the Royal Society / Colleges of the University of Cambridge / British people

      MarchRoger Michael Needham _____________________ BornDied

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2003-03-19 08:00:58
      9British people / Science and technology in the United Kingdom / Roger Needham / University of Cambridge Computer Laboratory / Martín Abadi / Microsoft Research / Andrew Herbert / Maurice Wilkes / Fellows of the Royal Society / Fellows of the British Computer Society / Colleges of the University of Cambridge

      ROGER NEEDHAMThis biographical note was prepared for a meeting to celebrate Roger Needham’s fifty years in Cambridge and five years at Microsoft Research Limited, held on 17th FebruaryFor further de

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2003-03-10 07:16:43
      10Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

      © IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

      Add to Reading List

      Source URL: web.mit.edu

      Language: English - Date: 2011-05-18 00:11:55
      UPDATE