Obserwuj
Michael Merritt
Michael Merritt
AT&T Labs - Research
Zweryfikowany adres z research.att.com - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
21681992
Atomic snapshots of shared memory
Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit
Journal of the ACM (JACM) 40 (4), 873-890, 1993
6971993
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
6671993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
6251990
Easy Impossibility Proofs for Distributed Concensus Problems.
MJ Fischer, NA Lynch, M Merritt
YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 1985
4151985
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2381993
Cryptographic protocols
RA DeMillo, NA Lynch, MJ Merritt
Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982
2171982
Time-constrained automata
M Merritt, F Modugno, MR Tuttle
CONCUR'91: 2nd International Conference on Concurrency Theory Amsterdam, The …, 1991
1841991
A distributed algorithm for deadlock detection and resolution
DP Mitchell, MJ Merritt
Proceedings of the third annual ACM symposium on Principles of distributed …, 1984
1831984
Lazy caching
Y Afek, G Brown, M Merritt
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993
1561993
Cryptographic protocols
MJ Merritt
Georgia Institute of Technology, 1983
1361983
Cryptographic protocol for remote authentication
SM Bellovin, MJ Merritt
US Patent 5,440,635, 1995
1331995
Computing with infinitely many processes: Under assumptions on concurrency and participation
M Merritt, G Taubenfeld
Distributed Computing: 14th International Conference, DISC 2000 Toledo …, 2002
1082002
Introduction to the theory of nested transactions
N Lynch, M Merritt
Theoretical Computer Science 62 (1-2), 123-185, 1986
1081986
Atomic transactions: in concurrent and distributed systems
NA Lynch, M Merritt
Morgan Kaufmann Publishers Inc., 1993
1021993
Proving sequential consistency of high-performance shared memories
PB Gibbons, M Merritt, K Gharachorloo
Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991
961991
Disentangling multi-object operations
Y Afek, M Merritt, G Taubenfeld, D Touitou
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
951997
Commutativity-based locking for nested transactions
A Fekete, N Lynch, M Merritt, W Weihl
Journal of Computer and System Sciences 41 (1), 65-156, 1990
941990
Protocols for data security
R Demillo, M Merritt
Computer 16 (02), 39-51, 1983
901983
A bounded first-in, first-enabled solution to the l-exclusion problem
Y Afek, D Dolev, E Gafni, M Merritt, N Shavit
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (3), 939-953, 1994
771994
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20