Follow
Michael Merritt
Michael Merritt
AT&T Labs - Research
Verified email at research.att.com - Homepage
Title
Cited by
Cited by
Year
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
21521992
Atomic snapshots of shared memory
Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit
Journal of the ACM (JACM) 40 (4), 873-890, 1993
6941993
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
6641993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
6221990
Easy Impossibility Proofs for Distributed Concensus Problems.
MJ Fischer, NA Lynch, M Merritt
YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 1985
4101985
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2361993
Cryptographic protocols
RA DeMillo, NA Lynch, MJ Merritt
Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982
2161982
Time-constrained automata
M Merritt, F Modugno, MR Tuttle
CONCUR 91, 408-423, 1991
1841991
A distributed algorithm for deadlock detection and resolution
DP Mitchell, MJ Merritt
Proceedings of the third annual ACM symposium on Principles of distributed …, 1984
1831984
Lazy caching
Y Afek, G Brown, M Merritt
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993
1561993
Cryptographic protocols
MJ Merritt
Georgia Institute of Technology, 1983
1361983
Cryptographic protocol for remote authentication
SM Bellovin, MJ Merritt
US Patent 5,440,635, 1995
1331995
Computing with infinitely many processes: Under assumptions on concurrency and participation
M Merritt, G Taubenfeld
Distributed Computing: 14th International Conference, DISC 2000 Toledo …, 2002
1082002
Introduction to the theory of nested transactions
N Lynch, M Merritt
Theoretical Computer Science 62 (1-2), 123-185, 1986
1081986
Atomic transactions: in concurrent and distributed systems
NA Lynch, M Merritt
Morgan Kaufmann Publishers Inc., 1993
1021993
Proving sequential consistency of high-performance shared memories
PB Gibbons, M Merritt, K Gharachorloo
Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991
961991
Disentangling multi-object operations
Y Afek, M Merritt, G Taubenfeld, D Touitou
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
951997
Commutativity-based locking for nested transactions
A Fekete, N Lynch, M Merritt, W Weihl
Journal of Computer and System Sciences 41 (1), 65-156, 1990
941990
Protocols for data security
R Demillo, M Merritt
Computer 16 (02), 39-51, 1983
901983
A bounded first-in, first-enabled solution to the l-exclusion problem
Y Afek, D Dolev, E Gafni, M Merritt, N Shavit
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (3), 939-953, 1994
771994
The system can't perform the operation now. Try again later.
Articles 1–20