Matthew K. Franklin

According to our database1, Matthew K. Franklin authored at least 62 papers between 1988 and 2016.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays.
Mobile Information Systems, 2016

2014
3DPIN: Enhancing security with 3D display.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.
IACR Cryptol. ePrint Arch., 2013

Unique Ring Signatures: A Practical Construction.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
A Framework for Unique Ring Signatures.
IACR Cryptol. ePrint Arch., 2012

Unique Group Signatures.
IACR Cryptol. ePrint Arch., 2012

Optimal Coding for Streaming Authentication and Interactive Communication.
Electronic Colloquium on Computational Complexity (ECCC), 2012

Privacy-preserving alibi systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Mix Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Fair threshold decryption with semi-trusted third parties.
IJACT, 2010

Efficient and Secure Evaluation of Multivariate Polynomials and Applications.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Communication-Efficient Private Protocols for Longest Common Subsequence.
IACR Cryptol. ePrint Arch., 2009

2007
Multi-Party Indirect Indexing and Applications.
IACR Cryptol. ePrint Arch., 2007

Secure Linear Algebra Using Linearly Recurrent Sequences.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Towards Optimal and Efficient Perfectly Secure Message Transmission.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Weakly-Private Secret Sharing Schemes.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
A survey of key evolving cryptosystems.
Int. J. Secur. Networks, 2006

Improved Efficiency for Private Stable Matching.
IACR Cryptol. ePrint Arch., 2006

Edge Eavesdropping Games.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficiency Tradeoffs for Malicious Two-Party Computation.
Proceedings of the Public Key Cryptography, 2006

Efficient Polynomial Operations in the Shared-Coefficients Setting.
Proceedings of the Public Key Cryptography, 2006

2005
Mix Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Byzantine Agreement Given Partial Broadcast.
J. Cryptology, 2005

2004
Secure Hypergraphs: Privacy from Partial Broadcast.
SIAM J. Discret. Math., 2004

A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2004

2003
Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2003

2002
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur., 2002

Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Efficient generation of shared RSA keys.
J. ACM, 2001

Identity Based Encryption From the Weil Pairing.
IACR Cryptol. ePrint Arch., 2001

Cryptology As a Network Service.
Proceedings of the Network and Distributed System Security Symposium, 2001

Lower Bounds for Multicast Message Authentication.
Proceedings of the Advances in Cryptology, 2001

2000
Secure Communication in Minimal Connectivity Models.
J. Cryptology, 2000

Eavesdropping games: a graph-theoretic approach to privacy in distributed systems.
J. ACM, 2000

Distribution chain security.
Proceedings of the CCS 2000, 2000

Commital Deniable Proofs and Electronic Campaign Finance.
Proceedings of the Advances in Cryptology, 2000

1999
Reliable Communication over Partially Authenticated Networks.
Theor. Comput. Sci., 1999

Mutual Search.
J. ACM, 1999

Self-Testing/Correcting Protocols (Extended Abstract).
Proceedings of the Distributed Computing, 1999

Enhancing privacy and trust in electronic communities.
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999

An Efficient Public Key Traitor Tracing Scheme.
Proceedings of the Advances in Cryptology, 1999

Anonymous Authentication with Subset Queries (extended abstract).
Proceedings of the CCS '99, 1999

1998
Auditable Metering with Lightweight Security.
J. Comput. Secur., 1998

Mutual Search (Extended Abstract).
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998

Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Proceedings of the Financial Cryptography, 1998

Secure Communications in Minimal Connectivity Models.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Efficient Generation of Shared RSA Keys (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997

Fair Exchange with a Semi-Trusted Third Party (extended abstract).
Proceedings of the CCS '97, 1997

1996
The Design and Implementation of a Secure Auction Service.
IEEE Trans. Software Eng., 1996

Joint Encryption and Message-Efficient Secure Computation.
J. Cryptology, 1996

The Omega Key Management Service.
J. Comput. Secur., 1996

Multi-Autority Secret-Ballot Elections with Linear Work.
Proceedings of the Advances in Cryptology, 1996

Low-Exponent RSA with Related Messages.
Proceedings of the Advances in Cryptology, 1996

1995
Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

Verifiable Signature Sharing.
Proceedings of the Advances in Cryptology, 1995

1994
The Blinding of Weak Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

1993
Secure and Efficient Off-Line Digital Money (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

1992
Communication Complexity of Secure Computation (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992

1991
Multilevel Specification of Real Time Systems.
Commun. ACM, 1991

1990
Multi-Level Specification and Verification of Real-Time Software.
Proceedings of the 12th International Conference on Software Engineering, 1990

1989
A Transformational Method for Verifying Safety Properties in Real-Time Systems.
Proceedings of the Real-Time Systems Symposium, 1989

1988
State-Based Specification of Complex Real-Time Systems.
Proceedings of the 9th IEEE Real-Time Systems Symposium (RTSS '88), 1988


  Loading...