Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
A logic of authentication
- M. Burrows, M. Abadi, R. Needham
- Computer ScienceTOCS
- 1 February 1990
TLDR
Using encryption for authentication in large networks of computers
- R. Needham, M. D. Schroeder
- Computer ScienceCACM
- 1 December 1978
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of…
A logic of authentication
- M. Burrows, M. Abadi, R. Needham
- Computer ScienceSOSP '89
- 1 November 1989
TLDR
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links
- M. D. Schroeder, A. Birrell, C. Thacker
- PhysicsIEEE J. Sel. Areas Commun.
- 1 October 1991
A sizing gage for use with an LVDT probe for producing an output signal representing the deviation of part dimension from a nominally ideal dimension, and a columnar display means comprising…
TEA, a Tiny Encryption Algorithm
- D. J. Wheeler, R. Needham
- Computer Science, MathematicsFSE
- 14 December 1994
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
Reasoning about belief in cryptographic protocols
- L. Gong, R. Needham, R. Yahalom
- Computer ScienceProceedings. IEEE Computer Society Symposium on…
- 7 May 1990
TLDR
Prudent Engineering Practice for Cryptographic Protocols
- M. Abadi, R. Needham
- Computer Science, MathematicsIEEE Trans. Software Eng.
- 16 May 1994
TLDR
Prudent engineering practice for cryptographic protocols
- M. Abadi, R. Needham
- Computer Science, MathematicsProceedings of IEEE Computer Society Symposium…
- 1994
We present principles for the design of cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have…
Protecting Poorly Chosen Secrets from Guessing Attacks
- L. Gong, T. Lomas, R. Needham, J. Saltzer
- Computer ScienceIEEE J. Sel. Areas Commun.
- 1 June 1993
TLDR
On the duality of operating system structures
- H. Lauer, R. Needham
- Computer ScienceOPSR
- 1 April 1979
TLDR
...
1
2
3
4
5
...