Encrypted key exchange: Password-based protocols secure against dictionary attacks SM Bellovin, M Merritt | 2260 | 1992 |
Atomic snapshots of shared memory Y Afek, H Attiya, D Dolev, E Gafni, M Merritt, N Shavit Journal of the ACM (JACM) 40 (4), 873-890, 1993 | 746 | 1993 |
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise SM Bellovin, M Merritt Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 685 | 1993 |
Limitations of the Kerberos authentication system SM Bellovin, M Merritt ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990 | 635 | 1990 |
Easy impossibility proofs for distributed consensus problems MJ Fischer, NA Lynch, M Merritt Distributed Computing 1, 26-39, 1986 | 452 | 1986 |
Cryptographic protocol for secure communications SM Bellovin, M Merritt US Patent 5,241,599, 1993 | 243 | 1993 |
Cryptographic protocols RA DeMillo, NA Lynch, MJ Merritt Proceedings of the fourteenth annual ACM symposium on Theory of computing …, 1982 | 221 | 1982 |
A distributed algorithm for deadlock detection and resolution DP Mitchell, MJ Merritt Proceedings of the third annual ACM symposium on Principles of distributed …, 1984 | 189 | 1984 |
Time-constrained automata M Merritt, F Modugno, MR Tuttle International Conference on Concurrency Theory, 408-423, 1991 | 188 | 1991 |
Lazy caching Y Afek, G Brown, M Merritt ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 182-205, 1993 | 159 | 1993 |
Cryptographic protocol for remote authentication SM Bellovin, MJ Merritt US Patent 5,440,635, 1995 | 134 | 1995 |
Atomic transactions: in concurrent and distributed systems NA Lynch, M Merritt Morgan Kaufmann Publishers Inc., 1993 | 130 | 1993 |
Cryptographic protocols MJ Merritt Georgia Institute of Technology, 1983 | 130 | 1983 |
Introduction to the theory of nested transactions N Lynch, M Merritt Theoretical Computer Science 62 (1-2), 123-185, 1986 | 117 | 1986 |
Computing with infinitely many processes: Under assumptions on concurrency and participation M Merritt, G Taubenfeld International Symposium on Distributed Computing, 164-178, 2000 | 111 | 2000 |
Disentangling multi-object operations Y Afek, M Merritt, G Taubenfeld, D Touitou Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997 | 99 | 1997 |
Commutativity-based locking for nested transactions A Fekete, N Lynch, M Merritt, W Weihl Journal of Computer and System Sciences 41 (1), 65-156, 1990 | 98 | 1990 |
Proving sequential consistency of high-performance shared memories PB Gibbons, M Merritt, K Gharachorloo Proceedings of the third annual ACM symposium on Parallel algorithms and …, 1991 | 95 | 1991 |
Simple constant-time consensus protocols in realistic failure models B Chor, M Merritt, DB Shmoys Journal of the ACM (JACM) 36 (3), 591-614, 1989 | 94 | 1989 |
Protocols for data security R DeMillo, M Merritt Computer 16 (02), 39-51, 1983 | 87 | 1983 |