Author: Michael D. Schroeder

Publications

Publication period start: 1972
Number of co-authors: 5

Co-authors

Number of publications with favourite co-authors
David K. Gifford
1
Jerome H. Saltzer
1
Roger M. Needham
3

Productive Colleagues

Most productive colleagues in number of publications
Jerome H. Saltzer
3
Roger M. Needham
4
David K. Gifford
11

Publications

Gifford, David K., Needham, Roger M., Schroeder, Michael D. (1988): The Cedar System. In Communications of the ACM, 31 (3) pp. 288-298.

Birrell, Andrew, Levin, Roy, Needham, Roger M., Schroeder, Michael D. (1982): Grapevine: An Exercise in Distributed Computing. In Communications of the ACM, 25 (4) pp. 260-274.

Needham, Roger M., Schroeder, Michael D. (1978): Using Encryption for Authentication in Large Networks of Computers. In Communications of the ACM, 21 (12) pp. 993-999.

Schroeder, Michael D., Saltzer, Jerome H. (1972): A Hardware Architecture for Implementing Protection Rings. In Communications of the ACM, 15 (3) pp. 157-170.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,778 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,778 designers enjoy our newsletter—sure you don’t want to receive it?