Needham, Roger Michael

Needham, Roger Michael
▪ 2004

      British engineer and computer scientist (b. Feb. 9, 1935, Sheffield, Eng.—d. Feb. 28, 2003, Cambridge, Eng.), devised a secure way of protecting computer password files that became the basis for all systems currently used. Needham began working as a research assistant in the computer laboratory of the University of Cambridge in 1963, after having earned a Ph.D. there. In 1967, while helping to develop a time-sharing system, whereby many users can access a single computer, he developed the one-way password encryption technique—a user's access password is encrypted irreversibly during setup and stored only in that form; when someone else subsequently tries to log on, the presented password is likewise encrypted and compared against the stored version. In 1978 he and Michael Schroeder produced the Needham-Schroeder protocol for authentication of computer users through passwords. Needham succeeded Maurice Wilkes as head of Cambridge's computer laboratory in 1980 and became professor of computer systems in 1981. Upon his retirement from the computer laboratory in 1995, he set up the Microsoft Research Laboratory, the first overseas research centre established by software giant Microsoft Corp. Needham was made CBE in 2001.

* * *


Universalium. 2010.

Нужно сделать НИР?

Look at other dictionaries:

  • Roger Needham — (links) mit David Wheeler (Mitte) und dem Kanzler der University of Cambridge, ca. 1979 Roger Michael Needham (CBE FREng FRS) (* 9. Februar 1935; † 1. März 2003 in Willingham, Cambridgeshire) war ein britischer …   Deutsch Wikipedia

  • Roger Needham — Infobox Scientist name = Roger Needham caption = Roger Needham in 1999 birth date = birth date|1935|2|9|df=y birth place = death date = death date and age|2003|3|1|1935|2|9|df=y death place = Willingham, Cambridgeshire residence = United Kingdom… …   Wikipedia

  • Needham-Schroeder Protokoll — Das Needham Schroeder Protokoll ist ein Protokoll für sicheren Datenaustausch in einem dezentralen Netzwerk. Es vereint Schlüsselaustausch und Authentifikation mit dem Ziel, eine sichere Kommunikation zwischen zwei Parteien in einem dezentralen… …   Deutsch Wikipedia

  • Needham-Schroeder-Protokoll — Das Needham Schroeder Protokoll ist ein Protokoll für sicheren Datenaustausch in einem dezentralen Netzwerk. Es vereint Schlüsselaustausch und Authentifikation mit dem Ziel, eine sichere Kommunikation zwischen zwei Parteien in einem dezentralen… …   Deutsch Wikipedia

  • Michael J. T. Guy — For the American musician, see Michael Guy. Michael Guy (born c.1942) is a British computer scientist and mathematician. He is known for early work on computer systems, such as the Phoenix system at the University of Cambridge,[1] and for… …   Wikipedia

  • Needham–Schroeder protocol — The term Needham–Schroeder protocol can refer to one of two communication protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.[1] These are: The Needham–Schroeder Symmetric Key Protocol is… …   Wikipedia

  • Needham-Schroeder protocol — The term Needham Schroeder protocol can refer to one of two communication protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.Citation | last1=Needham | first1=Roger | last2=Schroeder | first2 …   Wikipedia

  • Needham-Schroder — Protocole de Needham Schroeder Pour les articles homonymes, voir Needham et Schroeder. Needham Schroeder est un protocole d authentification dans les réseaux informatiques conçu pour être utilisé dans des réseaux non sûrs (Internet par exemple),… …   Wikipédia en Français

  • Needham-Schroeder — Protocole de Needham Schroeder Pour les articles homonymes, voir Needham et Schroeder. Needham Schroeder est un protocole d authentification dans les réseaux informatiques conçu pour être utilisé dans des réseaux non sûrs (Internet par exemple),… …   Wikipédia en Français

  • Needham-schroeder — Protocole de Needham Schroeder Pour les articles homonymes, voir Needham et Schroeder. Needham Schroeder est un protocole d authentification dans les réseaux informatiques conçu pour être utilisé dans des réseaux non sûrs (Internet par exemple),… …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”