Author: Michael D. Schroeder

Publication Overview

Publication period start: 1972
Number of co-authors: 5

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Gifford, David K., Needham, Roger M., Schroeder, Michael D. (1988): The Cedar System. In Communications of the ACM, 31 (3) pp. 288-298.
Birrell, Andrew, Levin, Roy, Needham, Roger M., Schroeder, Michael D. (1982): Grapevine: An Exercise in Distributed Computing. In Communications of the ACM, 25 (4) pp. 260-274.
Needham, Roger M., Schroeder, Michael D. (1978): Using Encryption for Authentication in Large Networks of Computers. In Communications of the ACM, 21 (12) pp. 993-999.
Schroeder, Michael D., Saltzer, Jerome H. (1972): A Hardware Architecture for Implementing Protection Rings. In Communications of the ACM, 15 (3) pp. 157-170.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,226 others.

Learn to design a life you love.

Next email in
6
days
21
hrs
20
mins
17
secs