Matthew K. Franklin

According to our database1, Matthew K. Franklin authored at least 79 papers between 1988 and 2016.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays.
Mobile Information Systems, 2016

2015
Optimal Coding for Streaming Authentication and Interactive Communication.
IEEE Trans. Information Theory, 2015

2014
3DPIN: Enhancing security with 3D display.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.
IACR Cryptology ePrint Archive, 2013

Unique Ring Signatures: A Practical Construction.
Proceedings of the Financial Cryptography and Data Security, 2013

Optimal Coding for Streaming Authentication and Interactive Communication.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
A Framework for Unique Ring Signatures.
IACR Cryptology ePrint Archive, 2012

Unique Group Signatures.
IACR Cryptology ePrint Archive, 2012

Optimal Coding for Streaming Authentication and Interactive Communication.
Electronic Colloquium on Computational Complexity (ECCC), 2012

Unique Group Signatures.
Proceedings of the Computer Security - ESORICS 2012, 2012

Privacy-preserving alibi systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2010
Fair threshold decryption with semi-trusted third parties.
IJACT, 2010

Efficient and Secure Evaluation of Multivariate Polynomials and Applications.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Communication-Efficient Private Protocols for Longest Common Subsequence.
IACR Cryptology ePrint Archive, 2009

Communication-Efficient Private Protocols for Longest Common Subsequence.
Proceedings of the Topics in Cryptology, 2009

Fair Threshold Decryption with Semi-Trusted Third Parties.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2007
Multi-Party Indirect Indexing and Applications.
IACR Cryptology ePrint Archive, 2007

Secure Linear Algebra Using Linearly Recurrent Sequences.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Towards Optimal and Efficient Perfectly Secure Message Transmission.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Weakly-Private Secret Sharing Schemes.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Improved Efficiency for Private Stable Matching.
Proceedings of the Topics in Cryptology, 2007

Multi-party Indirect Indexing and Applications.
Proceedings of the Advances in Cryptology, 2007

2006
A survey of key evolving cryptosystems.
IJSN, 2006

Improved Efficiency for Private Stable Matching.
IACR Cryptology ePrint Archive, 2006

Edge Eavesdropping Games.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficiency Tradeoffs for Malicious Two-Party Computation.
Proceedings of the Public Key Cryptography, 2006

Efficient Polynomial Operations in the Shared-Coefficients Setting.
Proceedings of the Public Key Cryptography, 2006

2005
Mix Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Byzantine Agreement Given Partial Broadcast.
J. Cryptology, 2005

2004
Secure Hypergraphs: Privacy from Partial Broadcast.
SIAM J. Discrete Math., 2004

A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2004

2003
Identity-Based Encryption from the Weil Pairing.
SIAM J. Comput., 2003

Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2003

2002
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur., 2002

Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Efficient generation of shared RSA keys.
J. ACM, 2001

Identity Based Encryption From the Weil Pairing.
IACR Cryptology ePrint Archive, 2001

An Algebraic Approach to IP Traceback.
Proceedings of the Network and Distributed System Security Symposium, 2001

Cryptology As a Network Service.
Proceedings of the Network and Distributed System Security Symposium, 2001

Lower Bounds for Multicast Message Authentication.
Proceedings of the Advances in Cryptology, 2001

Identity-Based Encryption from the Weil Pairing.
Proceedings of the Advances in Cryptology, 2001

2000
Secure Communication in Minimal Connectivity Models.
J. Cryptology, 2000

Eavesdropping games: a graph-theoretic approach to privacy in distributed systems.
J. ACM, 2000

Distribution chain security.
Proceedings of the CCS 2000, 2000

Commital Deniable Proofs and Electronic Campaign Finance.
Proceedings of the Advances in Cryptology, 2000

1999
Reliable Communication over Partially Authenticated Networks.
Theor. Comput. Sci., 1999

Mutual Search.
J. ACM, 1999

Mutual Search
CoRR, 1999

Self-Testing/Correcting Protocols (Extended Abstract).
Proceedings of the Distributed Computing, 1999

Enhancing privacy and trust in electronic communities.
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999

An Efficient Public Key Traitor Tracing Scheme.
Proceedings of the Advances in Cryptology, 1999

Anonymous Authentication with Subset Queries (extended abstract).
Proceedings of the CCS '99, 1999

1998
Auditable Metering with Lightweight Security.
Journal of Computer Security, 1998

Mutual Search (Extended Abstract).
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998

Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Proceedings of the Financial Cryptography, 1998

Secure Communications in Minimal Connectivity Models.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Reliable Communication over Partially Authenticated Networks.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

Auditable Metering with Lightweight Security.
Proceedings of the Financial Cryptography, 1997

Efficient Generation of Shared RSA Keys (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997

Fair Exchange with a Semi-Trusted Third Party (extended abstract).
Proceedings of the CCS '97, 1997

1996
The Design and Implementation of a Secure Auction Service.
IEEE Trans. Software Eng., 1996

Joint Encryption and Message-Efficient Secure Computation.
J. Cryptology, 1996

The Omega Key Management Service.
Journal of Computer Security, 1996

Multi-Autority Secret-Ballot Elections with Linear Work.
Proceedings of the Advances in Cryptology, 1996

Low-Exponent RSA with Related Messages.
Proceedings of the Advances in Cryptology, 1996

The Omega Key Management Service.
Proceedings of the CCS '96, 1996

1995
Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

The design and implementation of a secure auction service.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

Verifiable Signature Sharing.
Proceedings of the Advances in Cryptology, 1995

1994
The Blinding of Weak Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

1993
Secure and Efficient Off-Line Digital Money (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993

Joint Encryption and Message-Efficient Secure Computation.
Proceedings of the Advances in Cryptology, 1993

1992
Communication Complexity of Secure Computation (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992

1991
Multilevel Specification of Real Time Systems.
Commun. ACM, 1991

1990
Multi-Level Specification and Verification of Real-Time Software.
Proceedings of the 12th International Conference on Software Engineering, 1990

1989
A Transformational Method for Verifying Safety Properties in Real-Time Systems.
Proceedings of the Real-Time Systems Symposium, 1989

1988
State-Based Specification of Complex Real-Time Systems.
Proceedings of the 9th IEEE Real-Time Systems Symposium (RTSS '88), 1988


  Loading...