Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Matthew K. Franklin
@article{DBLP:journals/mis/LeeKF16, author = {Mun{-}Kyu Lee and Jin Bok Kim and Matthew K. Franklin}, title = {Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays}, journal = {Mob. Inf. Syst.}, volume = {2016}, pages = {8019830:1--8019830:9}, year = {2016}, url = {https://doi.org/10.1155/2016/8019830}, doi = {10.1155/2016/8019830}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/LeeKF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FranklinGOS15, author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman}, title = {Optimal Coding for Streaming Authentication and Interactive Communication}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {1}, pages = {133--145}, year = {2015}, url = {https://doi.org/10.1109/TIT.2014.2367094}, doi = {10.1109/TIT.2014.2367094}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FranklinGOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChowFZ14, author = {Sherman S. M. Chow and Matthew K. Franklin and Haibin Zhang}, editor = {Josh Benaloh}, title = {Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {85--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_5}, doi = {10.1007/978-3-319-04852-9\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChowFZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/LeeKF14, author = {Mun{-}Kyu Lee and Jin Bok Kim and Matthew K. Franklin}, title = {3DPIN: Enhancing security with 3D display}, booktitle = {{IEEE} 3rd Global Conference on Consumer Electronics, {GCCE} 2014, Tokyo, Japan, 7-10 October 2014}, pages = {129--130}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GCCE.2014.7031090}, doi = {10.1109/GCCE.2014.7031090}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/gcce/LeeKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FranklinGOS13, author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman}, editor = {Ran Canetti and Juan A. Garay}, title = {Optimal Coding for Streaming Authentication and Interactive Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {258--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_15}, doi = {10.1007/978-3-642-40084-1\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FranklinGOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranklinZ13, author = {Matthew K. Franklin and Haibin Zhang}, editor = {Ahmad{-}Reza Sadeghi}, title = {Unique Ring Signatures: {A} Practical Construction}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {162--170}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_13}, doi = {10.1007/978-3-642-39884-1\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranklinZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowFZ13, author = {Sherman S. M. Chow and Matthew K. Franklin and Haibin Zhang}, title = {Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2013}, url = {http://eprint.iacr.org/2013/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowFZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavisCF12, author = {Benjamin Davis and Hao Chen and Matthew K. Franklin}, editor = {Heung Youl Youm and Yoojae Won}, title = {Privacy-preserving alibi systems}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {34--35}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414475}, doi = {10.1145/2414456.2414475}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DavisCF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FranklinZ12, author = {Matthew K. Franklin and Haibin Zhang}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Unique Group Signatures}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {643--660}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_37}, doi = {10.1007/978-3-642-33167-1\_37}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FranklinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/FranklinGOS12, author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman}, title = {Optimal Coding for Streaming Authentication and Interactive Communication}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-104}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/104}, eprinttype = {ECCC}, eprint = {TR12-104}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/FranklinGOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinZ12, author = {Matthew K. Franklin and Haibin Zhang}, title = {Unique Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2012}, url = {http://eprint.iacr.org/2012/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinZ12a, author = {Matthew K. Franklin and Haibin Zhang}, title = {A Framework for Unique Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2012}, url = {http://eprint.iacr.org/2012/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinZ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Franklin11, author = {Matthew K. Franklin}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Mix Networks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {786--788}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_209}, doi = {10.1007/978-1-4419-5906-5\_209}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Franklin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HongKKFP10, author = {Jeongdae Hong and Jinil Kim and Jihye Kim and Matthew K. Franklin and Kunsoo Park}, title = {Fair threshold decryption with semi-trusted third parties}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {139--153}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038307}, doi = {10.1504/IJACT.2010.038307}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HongKKFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FranklinM10, author = {Matthew K. Franklin and Payman Mohassel}, editor = {Jianying Zhou and Moti Yung}, title = {Efficient and Secure Evaluation of Multivariate Polynomials and Applications}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {236--254}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_15}, doi = {10.1007/978-3-642-13708-2\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FranklinM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HongKKFP09, author = {Jeongdae Hong and Jinil Kim and Jihye Kim and Matthew K. Franklin and Kunsoo Park}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Fair Threshold Decryption with Semi-Trusted Third Parties}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {309--326}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_22}, doi = {10.1007/978-3-642-02620-1\_22}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HongKKFP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FranklinGM09, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, editor = {Marc Fischlin}, title = {Communication-Efficient Private Protocols for Longest Common Subsequence}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {265--278}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_18}, doi = {10.1007/978-3-642-00862-7\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FranklinGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinGM09, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, title = {Communication-Efficient Private Protocols for Longest Common Subsequence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2009}, url = {http://eprint.iacr.org/2009/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2008, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8}, doi = {10.1007/978-3-540-89641-8}, isbn = {978-3-540-89640-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FranklinGM07, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, editor = {Kaoru Kurosawa}, title = {Multi-party Indirect Indexing and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {283--297}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_17}, doi = {10.1007/978-3-540-76900-2\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FranklinGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FranklinGM07, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, editor = {Masayuki Abe}, title = {Improved Efficiency for Private Stable Matching}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {163--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_11}, doi = {10.1007/11967668\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FranklinGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BeimelF07, author = {Amos Beimel and Matthew K. Franklin}, editor = {Salil P. Vadhan}, title = {Weakly-Private Secret Sharing Schemes}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {253--272}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_14}, doi = {10.1007/978-3-540-70936-7\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BeimelF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiltzMWF07, author = {Eike Kiltz and Payman Mohassel and Enav Weinreb and Matthew K. Franklin}, editor = {Salil P. Vadhan}, title = {Secure Linear Algebra Using Linearly Recurrent Sequences}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {291--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_16}, doi = {10.1007/978-3-540-70936-7\_16}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiltzMWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FitziFGV07, author = {Matthias Fitzi and Matthew K. Franklin and Juan A. Garay and Harsha Vardhan Simhadri}, editor = {Salil P. Vadhan}, title = {Towards Optimal and Efficient Perfectly Secure Message Transmission}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {311--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_17}, doi = {10.1007/978-3-540-70936-7\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FitziFGV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinGM07, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, title = {Multi-Party Indirect Indexing and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2007}, url = {http://eprint.iacr.org/2007/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Franklin06, author = {Matthew K. Franklin}, title = {A survey of key evolving cryptosystems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {46--53}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010822}, doi = {10.1504/IJSN.2006.010822}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Franklin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MohasselF06, author = {Payman Mohassel and Matthew K. Franklin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Efficient Polynomial Operations in the Shared-Coefficients Setting}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {44--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_4}, doi = {10.1007/11745853\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MohasselF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MohasselF06a, author = {Payman Mohassel and Matthew K. Franklin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Efficiency Tradeoffs for Malicious Two-Party Computation}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {458--473}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_30}, doi = {10.1007/11745853\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MohasselF06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BeimelF06, author = {Amos Beimel and Matthew K. Franklin}, editor = {Roberto De Prisco and Moti Yung}, title = {Edge Eavesdropping Games}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {1--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_1}, doi = {10.1007/11832072\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/BeimelF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinGM06, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, title = {Improved Efficiency for Private Stable Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2006}, url = {http://eprint.iacr.org/2006/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ConsidineFFLMM05, author = {Jeffrey Considine and Matthias Fitzi and Matthew K. Franklin and Leonid A. Levin and Ueli M. Maurer and David Metcalf}, title = {Byzantine Agreement Given Partial Broadcast}, journal = {J. Cryptol.}, volume = {18}, number = {3}, pages = {191--217}, year = {2005}, url = {https://doi.org/10.1007/s00145-005-0308-x}, doi = {10.1007/S00145-005-0308-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ConsidineFFLMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Franklin05, author = {Matthew K. Franklin}, editor = {Henk C. A. van Tilborg}, title = {Mix Networks}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_257}, doi = {10.1007/0-387-23483-7\_257}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Franklin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/FranklinY04, author = {Matthew K. Franklin and Moti Yung}, title = {Secure Hypergraphs: Privacy from Partial Broadcast}, journal = {{SIAM} J. Discret. Math.}, volume = {18}, number = {3}, pages = {437--450}, year = {2004}, url = {https://doi.org/10.1137/S0895480198335215}, doi = {10.1137/S0895480198335215}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/FranklinY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Tatsuaki Okamoto}, title = {A Generic Construction for Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {81--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_7}, doi = {10.1007/978-3-540-24660-2\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2004, editor = {Matthew K. Franklin}, title = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99099}, doi = {10.1007/B99099}, isbn = {3-540-22668-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BonehF03, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity-Based Encryption from the Weil Pairing}, journal = {{SIAM} J. Comput.}, volume = {32}, number = {3}, pages = {586--615}, year = {2003}, url = {https://doi.org/10.1137/S0097539701398521}, doi = {10.1137/S0097539701398521}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/BonehF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Marc Joye}, title = {Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {19--32}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_2}, doi = {10.1007/3-540-36563-X\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DeanFS02, author = {Drew Dean and Matthew K. Franklin and Adam Stubblefield}, title = {An algebraic approach to {IP} traceback}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {119--137}, year = {2002}, url = {https://doi.org/10.1145/505586.505588}, doi = {10.1145/505586.505588}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DeanFS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StaddonMFBMD02, author = {Jessica Staddon and Sara K. Miner and Matthew K. Franklin and Dirk Balfanz and Michael Malkin and Drew Dean}, title = {Self-Healing Key Distribution with Revocation}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {241--257}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004375}, doi = {10.1109/SECPRI.2002.1004375}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/StaddonMFBMD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Efficient generation of shared {RSA} keys}, journal = {J. {ACM}}, volume = {48}, number = {4}, pages = {702--722}, year = {2001}, url = {https://doi.org/10.1145/502090.502094}, doi = {10.1145/502090.502094}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BonehF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, editor = {Joe Kilian}, title = {Identity-Based Encryption from the Weil Pairing}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {213--229}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_13}, doi = {10.1007/3-540-44647-8\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehDF01, author = {Dan Boneh and Glenn Durfee and Matthew K. Franklin}, editor = {Birgit Pfitzmann}, title = {Lower Bounds for Multicast Message Authentication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {437--452}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_27}, doi = {10.1007/3-540-44987-6\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehDF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BersonDFSS01, author = {Tom Berson and Drew Dean and Matthew K. Franklin and Diana K. Smetters and Mike Spreitzer}, title = {Cryptology As a Network Service}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/cryptology-network-service/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BersonDFSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DeanFS01, author = {Drew Dean and Matthew K. Franklin and Adam Stubblefield}, title = {An Algebraic Approach to {IP} Traceback}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/algebraic-approach-ip-traceback/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DeanFS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity Based Encryption From the Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2001}, url = {http://eprint.iacr.org/2001/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/FranklinGY00, author = {Matthew K. Franklin and Zvi Galil and Moti Yung}, title = {Eavesdropping games: a graph-theoretic approach to privacy in distributed systems}, journal = {J. {ACM}}, volume = {47}, number = {2}, pages = {225--243}, year = {2000}, url = {https://doi.org/10.1145/333979.333980}, doi = {10.1145/333979.333980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/FranklinGY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FranklinW00, author = {Matthew K. Franklin and Rebecca N. Wright}, title = {Secure Communication in Minimal Connectivity Models}, journal = {J. Cryptol.}, volume = {13}, number = {1}, pages = {9--30}, year = {2000}, url = {https://doi.org/10.1007/s001459910002}, doi = {10.1007/S001459910002}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FranklinW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FranklinS00, author = {Matthew K. Franklin and Tomas Sander}, editor = {Tatsuaki Okamoto}, title = {Commital Deniable Proofs and Electronic Campaign Finance}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {373--387}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_28}, doi = {10.1007/3-540-44448-3\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FranklinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DurfeeF00, author = {Glenn Durfee and Matthew K. Franklin}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Distribution chain security}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {63--70}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352610}, doi = {10.1145/352600.352610}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DurfeeF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/FranklinS00, author = {Matthew K. Franklin and Tomas Sander}, editor = {Lorrie Faith Cranor}, title = {Deniable payments and electronic campaign finance}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {67--68}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332249}, doi = {10.1145/332186.332249}, timestamp = {Mon, 23 May 2022 11:52:54 +0200}, biburl = {https://dblp.org/rec/conf/cfp/FranklinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/HoggHF00, author = {Tad Hogg and Bernardo A. Huberman and Matthew K. Franklin}, editor = {Lorrie Faith Cranor}, title = {Protecting privacy while sharing information in electronic communities}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {73--75}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332251}, doi = {10.1145/332186.332251}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/HoggHF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BuhrmanFGHTV99, author = {Harry Buhrman and Matthew K. Franklin and Juan A. Garay and Jaap{-}Henk Hoepman and John Tromp and Paul M. B. Vit{\'{a}}nyi}, title = {Mutual Search}, journal = {J. {ACM}}, volume = {46}, number = {4}, pages = {517--536}, year = {1999}, url = {https://doi.org/10.1145/320211.320232}, doi = {10.1145/320211.320232}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BuhrmanFGHTV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BeimelF99, author = {Amos Beimel and Matthew K. Franklin}, title = {Reliable Communication over Partially Authenticated Networks}, journal = {Theor. Comput. Sci.}, volume = {220}, number = {1}, pages = {185--210}, year = {1999}, url = {https://doi.org/10.1016/S0304-3975(98)00241-2}, doi = {10.1016/S0304-3975(98)00241-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BeimelF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonehF99, author = {Dan Boneh and Matthew K. Franklin}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Anonymous Authentication with Subset Queries (extended abstract)}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {113--119}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319725}, doi = {10.1145/319709.319725}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BonehF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehF99, author = {Dan Boneh and Matthew K. Franklin}, editor = {Michael J. Wiener}, title = {An Efficient Public Key Traitor Tracing Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {338--353}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_22}, doi = {10.1007/3-540-48405-1\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/HubermanFH99, author = {Bernardo A. Huberman and Matthew K. Franklin and Tad Hogg}, editor = {Stuart I. Feldman and Michael P. Wellman}, title = {Enhancing privacy and trust in electronic communities}, booktitle = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999}, pages = {78--86}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/336992.337012}, doi = {10.1145/336992.337012}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/HubermanFH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/FranklinGY99, author = {Matthew K. Franklin and Juan A. Garay and Moti Yung}, editor = {Prasad Jayanti}, title = {Self-Testing/Correcting Protocols (Extended Abstract)}, booktitle = {Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1693}, pages = {269--283}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48169-9\_19}, doi = {10.1007/3-540-48169-9\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/FranklinGY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/1999, editor = {Matthew K. Franklin}, title = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X}, doi = {10.1007/3-540-48390-X}, isbn = {3-540-66362-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-DS-9902005, author = {Harry Buhrman and Matthew K. Franklin and Juan A. Garay and Jaap{-}Henk Hoepman and John Tromp and Paul M. B. Vit{\'{a}}nyi}, title = {Mutual Search}, journal = {CoRR}, volume = {cs.DS/9902005}, year = {1999}, url = {https://arxiv.org/abs/cs/9902005}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-DS-9902005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FranklinM98, author = {Matthew K. Franklin and Dahlia Malkhi}, title = {Auditable Metering with Lightweight Security}, journal = {J. Comput. Secur.}, volume = {6}, number = {4}, pages = {237--256}, year = {1998}, url = {https://doi.org/10.3233/jcs-1998-6402}, doi = {10.3233/JCS-1998-6402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FranklinM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FranklinW98, author = {Matthew K. Franklin and Rebecca N. Wright}, editor = {Kaisa Nyberg}, title = {Secure Communications in Minimal Connectivity Models}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {346--360}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054138}, doi = {10.1007/BFB0054138}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FranklinW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranklinT98, author = {Matthew K. Franklin and Gene Tsudik}, editor = {Rafael Hirschfeld}, title = {Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {90--102}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055475}, doi = {10.1007/BFB0055475}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranklinT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BuhrmanFGHTV98, author = {Harry Buhrman and Matthew K. Franklin and Juan A. Garay and Jaap{-}Henk Hoepman and John Tromp and Paul M. B. Vit{\'{a}}nyi}, editor = {Howard J. Karloff}, title = {Mutual Search (Extended Abstract)}, booktitle = {Proceedings of the Ninth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 25-27 January 1998, San Francisco, California, {USA}}, pages = {481--489}, publisher = {{ACM/SIAM}}, year = {1998}, url = {http://dl.acm.org/citation.cfm?id=314613.314831}, timestamp = {Thu, 05 Jul 2018 07:29:49 +0200}, biburl = {https://dblp.org/rec/conf/soda/BuhrmanFGHTV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FranklinR97, author = {Matthew K. Franklin and Michael K. Reiter}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {Fair Exchange with a Semi-Trusted Third Party (extended abstract)}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {1--5}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266424}, doi = {10.1145/266420.266424}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FranklinR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehF97, author = {Dan Boneh and Matthew K. Franklin}, editor = {Burton S. Kaliski Jr.}, title = {Efficient Generation of Shared {RSA} Keys (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {425--439}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052253}, doi = {10.1007/BFB0052253}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranklinM97, author = {Matthew K. Franklin and Dahlia Malkhi}, editor = {Rafael Hirschfeld}, title = {Auditable Metering with Lightweight Security}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {151--160}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_75}, doi = {10.1007/3-540-63594-7\_75}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranklinM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/BeimelF97, author = {Amos Beimel and Matthew K. Franklin}, editor = {Marios Mavronicolas and Philippas Tsigas}, title = {Reliable Communication over Partially Authenticated Networks}, booktitle = {Distributed Algorithms, 11th International Workshop, {WDAG} '97, Saarbr{\"{u}}cken, Germany, September 24-26, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1320}, pages = {245--259}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030688}, doi = {10.1007/BFB0030688}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/BeimelF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ReiterFLW96, author = {Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright}, title = {The Omega Key Management Service}, journal = {J. Comput. Secur.}, volume = {4}, number = {4}, pages = {267--288}, year = {1996}, url = {https://doi.org/10.3233/JCS-1996-4402}, doi = {10.3233/JCS-1996-4402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ReiterFLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FranklinH96, author = {Matthew K. Franklin and Stuart Haber}, title = {Joint Encryption and Message-Efficient Secure Computation}, journal = {J. Cryptol.}, volume = {9}, number = {4}, pages = {217--232}, year = {1996}, url = {https://doi.org/10.1007/BF00189261}, doi = {10.1007/BF00189261}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FranklinH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/FranklinR96, author = {Matthew K. Franklin and Michael K. Reiter}, title = {The Design and Implementation of a Secure Auction Service}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {5}, pages = {302--312}, year = {1996}, url = {https://doi.org/10.1109/32.502223}, doi = {10.1109/32.502223}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/FranklinR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReiterFLW96, author = {Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright}, editor = {Li Gong and Jacques Stearn}, title = {The Omega Key Management Service}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {38--47}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238184}, doi = {10.1145/238168.238184}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoppersmithFPR96, author = {Don Coppersmith and Matthew K. Franklin and Jacques Patarin and Michael K. Reiter}, editor = {Ueli M. Maurer}, title = {Low-Exponent {RSA} with Related Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {1--9}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_1}, doi = {10.1007/3-540-68339-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoppersmithFPR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96, author = {Ronald Cramer and Matthew K. Franklin and Berry Schoenmakers and Moti Yung}, editor = {Ueli M. Maurer}, title = {Multi-Autority Secret-Ballot Elections with Linear Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {72--83}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_7}, doi = {10.1007/3-540-68339-9\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FranklinR95, author = {Matthew K. Franklin and Michael K. Reiter}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Verifiable Signature Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {50--63}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_5}, doi = {10.1007/3-540-49264-X\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FranklinR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FranklinR95, author = {Matthew K. Franklin and Michael K. Reiter}, title = {The design and implementation of a secure auction service}, booktitle = {Proceedings of the 1995 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 8-10, 1995}, pages = {2--14}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/SECPRI.1995.398918}, doi = {10.1109/SECPRI.1995.398918}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/FranklinR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FranklinY95, author = {Matthew K. Franklin and Moti Yung}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {Secure hypergraphs: privacy from partial broadcast (Extended Abstract)}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {36--44}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225077}, doi = {10.1145/225058.225077}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FranklinY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FranklinY94, author = {Matthew K. Franklin and Moti Yung}, editor = {Alfredo De Santis}, title = {The Blinding of Weak Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {67--76}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053425}, doi = {10.1007/BFB0053425}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FranklinY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FranklinH93, author = {Matthew K. Franklin and Stuart Haber}, editor = {Douglas R. Stinson}, title = {Joint Encryption and Message-Efficient Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {266--277}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_23}, doi = {10.1007/3-540-48329-2\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FranklinH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FranklinGY93, author = {Matthew K. Franklin and Zvi Galil and Moti Yung}, title = {Eavesdropping Games: {A} Graph-Theoretic Approach to Privacy in Distributed Systems}, booktitle = {34th Annual Symposium on Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993}, pages = {670--679}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/SFCS.1993.366820}, doi = {10.1109/SFCS.1993.366820}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/FranklinGY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FranklinY93, author = {Matthew K. Franklin and Moti Yung}, editor = {Andrzej Lingas and Rolf G. Karlsson and Svante Carlsson}, title = {Secure and Efficient Off-Line Digital Money (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 20nd International Colloquium, ICALP93, Lund, Sweden, July 5-9, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {700}, pages = {265--276}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56939-1\_78}, doi = {10.1007/3-540-56939-1\_78}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FranklinY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FranklinY92, author = {Matthew K. Franklin and Moti Yung}, editor = {S. Rao Kosaraju and Mike Fellows and Avi Wigderson and John A. Ellis}, title = {Communication Complexity of Secure Computation (Extended Abstract)}, booktitle = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing, May 4-6, 1992, Victoria, British Columbia, Canada}, pages = {699--710}, publisher = {{ACM}}, year = {1992}, url = {https://doi.org/10.1145/129712.129780}, doi = {10.1145/129712.129780}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FranklinY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GabrielianF91, author = {Armen Gabrielian and Matthew K. Franklin}, title = {Multilevel Specification of Real Time Systems}, journal = {Commun. {ACM}}, volume = {34}, number = {5}, pages = {50--60}, year = {1991}, url = {https://doi.org/10.1145/103167.103173}, doi = {10.1145/103167.103173}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GabrielianF91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GabrielianF90, author = {Armen Gabrielian and Matthew K. Franklin}, editor = {Fran{\c{c}}ois{-}R{\'{e}}gis Valette and Peter A. Freeman and Marie{-}Claude Gaudel}, title = {Multi-Level Specification and Verification of Real-Time Software}, booktitle = {Proceedings of the 12th International Conference on Software Engineering, Nice, France, March 26-30, 1990}, pages = {52--62}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {http://dl.acm.org/citation.cfm?id=100302}, timestamp = {Mon, 14 May 2012 18:17:13 +0200}, biburl = {https://dblp.org/rec/conf/icse/GabrielianF90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/FranklinG89, author = {Matthew K. Franklin and Armen Gabrielian}, title = {A Transformational Method for Verifying Safety Properties in Real-Time Systems}, booktitle = {Proceedings of the Real-Time Systems Symposium - 1989, Santa Monica, California, USA, December 1989}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/REAL.1989.63562}, doi = {10.1109/REAL.1989.63562}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/FranklinG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/GabrielianF88, author = {Armen Gabrielian and Matthew K. Franklin}, title = {State-Based Specification of Complex Real-Time Systems}, booktitle = {Proceedings of the 9th {IEEE} Real-Time Systems Symposium {(RTSS} '88), December 6-8, 1988, Huntsville, Alabama, {USA}}, pages = {2--11}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/REAL.1988.51095}, doi = {10.1109/REAL.1988.51095}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/GabrielianF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.