Follow
Michael Merritt
Michael Merritt
AT&T Labs - Research
Verified email at research.att.com - Homepage
Title
Cited by
Cited by
Year
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
22321992
Atomic snapshots of shared memory
Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit
Journal of the ACM (JACM) 40 (4), 873-890, 1993
7291993
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
6781993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
6321990
Easy impossibility proofs for distributed consensus problems
MJ Fischer, NA Lynch, M Merritt
Distributed Computing 1, 26-39, 1986
4421986
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2431993
Cryptographic protocols
RA DeMillo, NA Lynch, MJ Merritt
Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982
2191982
Time-constrained automata
M Merritt, F Modugno, MR Tuttle
International Conference on Concurrency Theory, 408-423, 1991
1881991
A distributed algorithm for deadlock detection and resolution
DP Mitchell, MJ Merritt
Proceedings of the third annual ACM symposium on Principles of distributed …, 1984
1881984
Lazy caching
Y Afek, G Brown, M Merritt
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993
1571993
Cryptographic protocol for remote authentication
SM Bellovin, MJ Merritt
US Patent 5,440,635, 1995
1341995
Atomic transactions: in concurrent and distributed systems
NA Lynch, M Merritt
Morgan Kaufmann Publishers Inc., 1993
1301993
Cryptographic protocols
MJ Merritt
Georgia Institute of Technology, 1983
1301983
Introduction to the theory of nested transactions
N Lynch, M Merritt
Theoretical Computer Science 62 (1-2), 123-185, 1986
1171986
Computing with infinitely many processes: Under assumptions on concurrency and participation
M Merritt, G Taubenfeld
International Symposium on Distributed Computing, 164-178, 2000
1102000
Disentangling multi-object operations
Y Afek, M Merritt, G Taubenfeld, D Touitou
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
991997
Commutativity-based locking for nested transactions
A Fekete, N Lynch, M Merritt, W Weihl
Journal of Computer and System Sciences 41 (1), 65-156, 1990
981990
Proving sequential consistency of high-performance shared memories
PB Gibbons, M Merritt, K Gharachorloo
Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991
951991
Simple constant-time consensus protocols in realistic failure models
B Chor, M Merritt, DB Shmoys
Journal of the ACM (JACM) 36 (3), 591-614, 1989
921989
Protocols for data security
R DeMillo, M Merritt
Computer 16 (02), 39-51, 1983
861983
The system can't perform the operation now. Try again later.
Articles 1–20