Michael Merritt
Michael Merritt
AT&T Labs - Research
確認したメール アドレス: research.att.com - ホームページ
タイトル
引用先
引用先
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
20271992
Atomic snapshots of shared memory
Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit
Journal of the ACM (JACM) 40 (4), 873-890, 1993
6451993
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
6321993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
6011990
Easy impossibility proofs for distributed consensus problems
MJ Fischer, NA Lynch, M Merritt
Distributed Computing 1 (1), 26-39, 1986
358*1986
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2301993
Cryptographic protocols
RA DeMillo, NA Lynch, MJ Merritt
Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982
2111982
Time-constrained automata
M Merritt, F Modugno, MR Tuttle
International Conference on Concurrency Theory, 408-423, 1991
1771991
A distributed algorithm for deadlock detection and resolution
DP Mitchell, MJ Merritt
Proceedings of the third annual ACM symposium on Principles of distributed …, 1984
1771984
Lazy caching
Y Afek, G Brown, M Merritt
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993
1511993
Cryptographic protocol for remote authentication
SM Bellovin, MJ Merritt
US Patent 5,440,635, 1995
1321995
Cryptographic protocols
MJ Merritt
Georgia Institute of Technology, 1983
1321983
Introduction to the theory of nested transactions
N Lynch, M Merritt
Theoretical Computer Science 62 (1-2), 123-185, 1986
1071986
Computing with infinitely many processes
M Merritt, G Taubenfeld
International Symposium on Distributed Computing, 164-178, 2000
1022000
Proving sequential consistency of high-performance shared memories
PB Gibbons, M Merritt, K Gharachorloo
Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991
981991
Commutativity-based locking for nested transactions
A Fekete, N Lynch, M Merritt, W Weihl
Journal of Computer and System Sciences 41 (1), 65-156, 1990
941990
Disentangling multi-object operations
Y Afek, M Merritt, G Taubenfeld, D Touitou
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
931997
Atomic transactions: in concurrent and distributed systems
NA Lynch, M Merritt
Morgan Kaufmann Publishers Inc., 1993
891993
Protocols for data security
R Demillo, M Merritt
Computer 16 (02), 39-51, 1983
841983
A bounded first-in, first-enabled solution to the l-exclusion problem
Y Afek, D Dolev, E Gafni, M Merritt, N Shavit
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (3), 939-953, 1994
74*1994
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20