Roger Needham
Computer scientist
Roger Needham's AcademicInfluence.com Rankings
Download Badge
Computer Science
Why Is Roger Needham Influential?
(Suggest an Edit or Addition)According to Wikipedia, Roger Michael Needham was a British computer scientist. Early life and education Needham was born in Birmingham, England, the only child of Phyllis Mary, née Baker and Leonard William Needham , a university chemistry lecturer. He attended Doncaster Grammar School for Boys in Doncaster going on to St John's College, Cambridge in 1953, and graduating with a BA in 1956 in mathematics and philosophy. His PhD thesis was on applications of digital computers to the automatic classification and retrieval of documents. He worked on a variety of key computing projects in security, operating systems, computer architecture and local area networks.
Roger Needham's Published Works
Published Works
- Using encryption for authentication in large networks of computers (1978) (2715)
- A logic of authentication (1989) (2398)
- A logic of authentication (1990) (1672)
- Reasoning about belief in cryptographic protocols (1990) (748)
- Prudent engineering practice for cryptographic protocols (1994) (717)
- Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links (1991) (711)
- TEA, a Tiny Encryption Algorithm (1994) (619)
- Grapevine: an exercise in distributed computing (1982) (524)
- On the duality of operating system structures (1979) (439)
- Protecting Poorly Chosen Secrets from Guessing Attacks (1993) (414)
- Robustness Principles for Public Key Protocols (1995) (235)
- Authentication revisited (1987) (217)
- The Steganographic File System (1998) (204)
- Programming Satan's Computer (1995) (188)
- Denial of service (1993) (171)
- Experience with Grapevine: the growth of a distributed system (1984) (165)
- A new family of authentication protocols (1998) (165)
- Reducing risks from poorly chosen keys (1989) (147)
- The Cambridge CAP computer and its protection system (1977) (120)
- A caching file system for a programmer's workstation (1985) (118)
- A Global Authentication Service without Global Trust (1986) (117)
- Denial of service: an example (1994) (113)
- The Cedar file system (1988) (109)
- The Cambridge Fast Ring Networking System (1988) (103)
- Authentication: A Practical Study in Belief and Action (1988) (68)
- A Universal File Server (1980) (68)
- The thesaurus approach to information retrieval (1997) (67)
- Artificial Intelligence : A General Survey (2012) (65)
- Rejoinder to Nessett (1990) (59)
- The changing environment for security protocols (1997) (50)
- The Cambridge Model Distributed System (1980) (45)
- Tuning Systems : From Composition to Performance (2004) (36)
- A Method for Using Computers in Information Classification (1962) (35)
- Systems aspects of The Cambridge Ring (1979) (33)
- Automatic term classifications and retrieval (1968) (29)
- The Scope of a Logic of Authentication (1989) (21)
- Fast Packet Switching for Integrated Services (1998) (20)
- Automatic Classification in Linguistics (1967) (20)
- The CAP project - an interim evaluation (1977) (18)
- Adding capability access to conventional file servers (1979) (18)
- The CAP filing system (1977) (18)
- Applications of the theory of clumps (1965) (16)
- How to connect stable memory to a computer (1983) (16)
- Cryptography and secure channels (1993) (14)
- Grapevine: An exercise in distributed computing (1981) (14)
- An asynchronous garbage collector for the Cambridge File Server (1980) (13)
- COMPUTER METHODS FOR CLASSIFICATION AND GROUPING (1965) (13)
- Computer Systems Theory, Technology, and Applications: A Tribute to Roger Needham (Monographs in Computer Science) (2004) (13)
- The architecture of the universe network (1984) (13)
- Theory and practice in operating system design (1969) (12)
- Note on evaluation (1973) (11)
- Computers, Language and Speech: Formal Theories and Statistical Data (2000) (10)
- The use of broadcast techniques on the universe network (1984) (10)
- The structure of a multiprogramming supervisor (1968) (10)
- Domains of Protection and the Management of Processes (1974) (9)
- Report on the Third European SIGOPS Workshop "Autonomy or Interdependence in Distributed Systems", September 19-21, 1988, Ca, bridge, England (1989) (8)
- Storage and synchronization for distributed continuous media (1995) (8)
- An asynchronous garbage collector for the CAP filing system (1978) (7)
- An Approach to Real-time Scheduling - but is it Really a Problem for Multimedia? (1992) (7)
- The Clifford Paterson Lecture, 2002 Computer security? (2003) (7)
- The TRIPOS filing machine, a front end to a file server (1983) (7)
- Is there anything special about AI (1990) (7)
- Distributed Computing with a Processor Bank (1989) (6)
- Later developments at Cambridge: Titan, CAP, and the Cambridge Ring (1992) (6)
- Logic and over-simplification (1998) (6)
- Experience with Grapevine: The Growth of a Distributed System (Summary) (1983) (6)
- Sequencing computation steps in a network (1981) (6)
- Keynote Address: The Changing Environment (1999) (5)
- A reduction method for non-arithmetic data, and its application to thesauric translation (1959) (5)
- Keynote address : The changing environment (Transcript of discussion) (2000) (4)
- Capabilities and Security (1990) (4)
- Handling difficult faults in operating systems (1971) (4)
- Prudent Engineering Practice for Cryptographic Protocols-Software Engineering, IEEE Transactions on (2004) (3)
- The Design of Multiple-Access Computer Systems: Part 2 (1968) (3)
- The Analogy between Mechanical Translation and Library Retrieval (2011) (3)
- Using cryptography for authentication (1990) (3)
- Autonet: a High-speed, Self-connguring Local Area Network Using Point-to-point Links. Acknowledgment Simulation of a High-speed Wormhole Network in a Parallel Language. 1995. Submitted for Publication. 5.2.2 Man 5 Applications and Testbeds 5.1 Applications 5.2 Testbeds 5.2.1 Campus (2000) (3)
- Keynote Address: Mobile Computing versus Immobile Security (2001) (3)
- The hardware environment (1999) (2)
- Software engineering techniques used in the development of the cambridge multiple‐access system (1971) (2)
- Introduction: combining formal theories and statistical data in natural language processing (2000) (2)
- Handling difficult faults in operating systems (1972) (2)
- Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion) (2000) (1)
- Two cryptographic notes (1994) (1)
- Unison ߝ communications research for office applications (1986) (1)
- Royal Society/British Academy" Artificial Intelligence and The Mind: New Breakthroughs or Dead Ends? (1994) (1)
- Lecture held at the Royal Society, 14 November 2002The Clifford Paterson Lecture, 2002. Computer security? (2003) (1)
- Back to the Beginning (2002) (1)
- Character streams (1978) (1)
- On the negotiation of access control policies. Discussion (2002) (1)
- Donald Watts Davies, C.B.E. 7 June 1924 – 28 May 2000 (2002) (0)
- Third party certification of HTTP service access statistics. Discussion. Authors' reply (1999) (0)
- Computers and communications (1996) (0)
- Managing the Development of Secure Systems (2008) (0)
- Chapter 8 Protection (1985) (0)
- Gravevine: An Exercise in Distributed Computing (summary). (1981) (0)
- Book Review (1963) (0)
- Mobile carrier tracking system (1989) (0)
- External consistency and the verification of security protocols. Discussion. Authors' reply (1999) (0)
- Keynote Address (2002) (0)
- Delegating trust. Discussion. Authors' reply (1999) (0)
- A proof of non-repudiation. Discussion (2002) (0)
- Public Signature Veriication Keys Signature Checking Keys (1996) (0)
- Local mesh network high speed (1990) (0)
- combining formal theories and statistical data in natural language processing (2000) (0)
- 8 Appendix: Symmetric Key- Distribution 7 Acknowledgements 3.5 Passphrase Quality 4 Transferring Administrative Burdens 3.3 Certiicate Revocation Lists 3.4 Private-key Management 3.1 Authenticating the User 3.2 Authenticating the Ca Compliance Defects in Public-key Cryptography (1996) (0)
- 8 Appendix: Symmetric Key- Distribution 7 Acknowledgements 3.5 Passphrase Quality 4 Transferring Administrative Burdens 3.3 Certiicate Revocation Lists 3.4 Private-key Management 3.1 Authenticating the User 3.2 Authenticating the Ca Compliance Defects in Public-key Cryptography (1996) (0)
- What Next? Some Speculations (1991) (0)
- On making distributed systems that work (1986) (0)
- Panel Session - Future Directions (1998) (0)
- Authentication Logics : New Theory and Implementations (2002) (0)
- INFORMATION RETRIEVAL AND SOME COGNATE COMPUTING PROBLEMS (1966) (0)
- Review: Book Review (1961) (0)
- Capabilities and Protection (1980) (0)
- Schon. Atomic: a Very-high-speed Local Area Network. in Ieee Workshop on High-speed Cray T3d (gcm Atmos Model) (1996) (0)
- The Cambridge Cap Computer 5. I Introduction (2002) (0)
- Alvar Ellegård, Hans Karlgren & Henning Spang-Hanssen. Structures and Quanta: Three Essays on Linguistic Description. (Interdisciplinary Studies from the Scandinavian Summer University, No. 12.) Copenhagen: Munksgaard, 1963. Pp. 72. (1965) (0)
- Locks in Distributed Systems - Observations (1988) (0)
- Secure fingerprinting using public-key cryptography. Discussion. Authors' reply (1999) (0)
- PIM security. Discussion (2002) (0)
- Delegation of responsibilities. Discussion. Authors' reply (1999) (0)
- Fast communications and slow computers (1996) (0)
- SPECIMEN CLUMP CARD (0)
- Modelling the human digestive system (2005) (0)
- Adding Capability to Conventional File Servers. (1979) (0)
- Design considerations for a processing server (1981) (0)
- Current work on authentication (1986) (0)
This paper list is powered by the following services:
Other Resources About Roger Needham
What Schools Are Affiliated With Roger Needham?
Roger Needham is affiliated with the following schools: