Michael Merritt
Michael Merritt
AT&T Labs - Research
Verified email at research.att.com - Homepage
TitleCited byYear
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
Atomic snapshots of shared memory
Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit
Journal of the ACM (JACM) 40 (4), 873-890, 1993
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
Easy impossibility proofs for distributed consensus problems
MJ Fischer, NA Lynch, M Merritt
Distributed Computing 1 (1), 26-39, 1986
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
Cryptographic protocols
RA DeMillo, NA Lynch, MJ Merritt
Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982
Time-constrained automata
M Merritt, F Modugno, MR Tuttle
International Conference on Concurrency Theory, 408-423, 1991
A distributed algorithm for deadlock detection and resolution
DP Mitchell, MJ Merritt
Proceedings of the third annual ACM symposium on Principles of distributed …, 1984
Lazy caching
Y Afek, G Brown, M Merritt
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993
Cryptographic protocols.
MJ Merritt
Cryptographic protocol for remote authentication
SM Bellovin, MJ Merritt
US Patent 5,440,635, 1995
Introduction to the theory of nested transactions
N Lynch, M Merritt
Theoretical Computer Science 62 (1-2), 123-185, 1986
Proving sequential consistency of high-performance shared memories
PB Gibbons, M Merritt, K Gharachorloo
Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991
Computing with infinitely many processes
M Merritt, G Taubenfeld
International Symposium on Distributed Computing, 164-178, 2000
Disentangling multi-object operations
Y Afek, M Merritt, G Taubenfeld, D Touitou
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
Commutativity-based locking for nested transactions
A Fekete, N Lynch, M Merritt, W Weihl
Journal of Computer and System Sciences 41 (1), 65-156, 1990
Atomic transactions: in concurrent and distributed systems
NA Lynch, M Merritt, RR Yager
Morgan Kaufmann Publishers Inc., 1993
Protocols for data security
R DeMillo, M Merritt
Computer, 39-51, 1983
A bounded first-in, first-enabled solution to the l-exclusion problem
Y Afek, D Dolev, E Gafni, M Merritt, N Shavit
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (3), 939-953, 1994
The system can't perform the operation now. Try again later.
Articles 1–20