| 2009 |
| 62 | EE | Matthew K. Franklin,
Mark Gondree,
Payman Mohassel:
Communication-Efficient Private Protocols for Longest Common Subsequence.
CT-RSA 2009: 265-278 |
| 2008 |
| 61 | | Matthew K. Franklin,
Lucas Chi Kwong Hui,
Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
Springer 2008 |
| 2007 |
| 60 | EE | Matthew K. Franklin,
Mark Gondree,
Payman Mohassel:
Multi-party Indirect Indexing and Applications.
ASIACRYPT 2007: 283-297 |
| 59 | EE | Matthew K. Franklin,
Mark Gondree,
Payman Mohassel:
Improved Efficiency for Private Stable Matching.
CT-RSA 2007: 163-177 |
| 58 | EE | Amos Beimel,
Matthew K. Franklin:
Weakly-Private Secret Sharing Schemes.
TCC 2007: 253-272 |
| 57 | EE | Eike Kiltz,
Payman Mohassel,
Enav Weinreb,
Matthew K. Franklin:
Secure Linear Algebra Using Linearly Recurrent Sequences.
TCC 2007: 291-310 |
| 56 | EE | Matthias Fitzi,
Matthew K. Franklin,
Juan A. Garay,
S. Harsha Vardhan:
Towards Optimal and Efficient Perfectly Secure Message Transmission.
TCC 2007: 311-322 |
| 2006 |
| 55 | EE | Payman Mohassel,
Matthew K. Franklin:
Efficient Polynomial Operations in the Shared-Coefficients Setting.
Public Key Cryptography 2006: 44-57 |
| 54 | EE | Payman Mohassel,
Matthew K. Franklin:
Efficiency Tradeoffs for Malicious Two-Party Computation.
Public Key Cryptography 2006: 458-473 |
| 53 | EE | Amos Beimel,
Matthew K. Franklin:
Edge Eavesdropping Games.
SCN 2006: 1-17 |
| 52 | EE | Matthew K. Franklin:
A survey of key evolving cryptosystems.
IJSN 1(1/2): 46-53 (2006) |
| 2005 |
| 51 | EE | Matthew K. Franklin:
Mix Networks.
Encyclopedia of Cryptography and Security 2005 |
| 50 | EE | Jeffrey Considine,
Matthias Fitzi,
Matthew K. Franklin,
Leonid A. Levin,
Ueli M. Maurer,
David Metcalf:
Byzantine Agreement Given Partial Broadcast.
J. Cryptology 18(3): 191-217 (2005) |
| 2004 |
| 49 | | Matthew K. Franklin:
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
Springer 2004 |
| 48 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
CT-RSA 2004: 81-98 |
| 47 | EE | Matthew K. Franklin,
Moti Yung:
Secure Hypergraphs: Privacy from Partial Broadcast.
SIAM J. Discrete Math. 18(3): 437-450 (2004) |
| 2003 |
| 46 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
Intrusion-Resilient Public-Key Encryption.
CT-RSA 2003: 19-32 |
| 45 | EE | Dan Boneh,
Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing.
SIAM J. Comput. 32(3): 586-615 (2003) |
| 2002 |
| 44 | EE | Jessica Staddon,
Sara K. Miner,
Matthew K. Franklin,
Dirk Balfanz,
Michael Malkin,
Drew Dean:
Self-Healing Key Distribution with Revocation.
IEEE Symposium on Security and Privacy 2002: 241-257 |
| 43 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur. 5(2): 119-137 (2002) |
| 2001 |
| 42 | EE | Dan Boneh,
Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing.
CRYPTO 2001: 213-229 |
| 41 | EE | Dan Boneh,
Glenn Durfee,
Matthew K. Franklin:
Lower Bounds for Multicast Message Authentication.
EUROCRYPT 2001: 437-452 |
| 40 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An Algebraic Approach to IP Traceback.
NDSS 2001 |
| 39 | EE | Tom Berson,
Drew Dean,
Matthew K. Franklin,
Diana K. Smetters,
Mike Spreitzer:
Cryptology As a Network Service.
NDSS 2001 |
| 38 | EE | Dan Boneh,
Matthew K. Franklin:
Efficient generation of shared RSA keys.
J. ACM 48(4): 702-722 (2001) |
| 2000 |
| 37 | EE | Glenn Durfee,
Matthew K. Franklin:
Distribution chain security.
ACM Conference on Computer and Communications Security 2000: 63-70 |
| 36 | EE | Matthew K. Franklin,
Tomas Sander:
Commital Deniable Proofs and Electronic Campaign Finance.
ASIACRYPT 2000: 373-387 |
| 35 | EE | Matthew K. Franklin,
Zvi Galil,
Moti Yung:
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems.
J. ACM 47(2): 225-243 (2000) |
| 34 | EE | Matthew K. Franklin,
Rebecca N. Wright:
Secure Communication in Minimal Connectivity Models.
J. Cryptology 13(1): 9-30 (2000) |
| 1999 |
| 33 | | Matthew K. Franklin:
Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings
Springer 1999 |
| 32 | EE | Dan Boneh,
Matthew K. Franklin:
Anonymous Authentication with Subset Queries (extended abstract).
ACM Conference on Computer and Communications Security 1999: 113-119 |
| 31 | EE | Bernardo A. Huberman,
Matthew K. Franklin,
Tad Hogg:
Enhancing privacy and trust in electronic communities.
ACM Conference on Electronic Commerce 1999: 78-86 |
| 30 | EE | Dan Boneh,
Matthew K. Franklin:
An Efficient Public Key Traitor Tracing Scheme.
CRYPTO 1999: 338-353 |
| 29 | EE | Matthew K. Franklin,
Juan A. Garay,
Moti Yung:
Self-Testing/Correcting Protocols (Extended Abstract).
DISC 1999: 269-283 |
| 28 | EE | Harry Buhrman,
Matthew K. Franklin,
Juan A. Garay,
Jaap-Henk Hoepman,
John Tromp,
Paul M. B. Vitányi:
Mutual Search
CoRR cs.DS/9902005: (1999) |
| 27 | EE | Harry Buhrman,
Matthew K. Franklin,
Juan A. Garay,
Jaap-Henk Hoepman,
John Tromp,
Paul M. B. Vitányi:
Mutual Search.
J. ACM 46(4): 517-536 (1999) |
| 26 | EE | Amos Beimel,
Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks.
Theor. Comput. Sci. 220(1): 185-210 (1999) |
| 1998 |
| 25 | EE | Matthew K. Franklin,
Rebecca N. Wright:
Secure Communications in Minimal Connectivity Models.
EUROCRYPT 1998: 346-360 |
| 24 | EE | Matthew K. Franklin,
Gene Tsudik:
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Financial Cryptography 1998: 90-102 |
| 23 | | Harry Buhrman,
Matthew K. Franklin,
Juan A. Garay,
Jaap-Henk Hoepman,
John Tromp,
Paul M. B. Vitányi:
Mutual Search (Extended Abstract).
SODA 1998: 481-489 |
| 22 | | Matthew K. Franklin,
Dahlia Malkhi:
Auditable Metering with Lightweight Security.
Journal of Computer Security 6(4): 237-256 (1998) |
| 1997 |
| 21 | EE | Matthew K. Franklin,
Michael K. Reiter:
Fair Exchange with a Semi-Trusted Third Party (extended abstract).
ACM Conference on Computer and Communications Security 1997: 1-5 |
| 20 | EE | Dan Boneh,
Matthew K. Franklin:
Efficient Generation of Shared RSA Keys (Extended Abstract).
CRYPTO 1997: 425-439 |
| 19 | | Matthew K. Franklin,
Dahlia Malkhi:
Auditable Metering with Lightweight Security.
Financial Cryptography 1997: 151-160 |
| 18 | | Amos Beimel,
Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks.
WDAG 1997: 245-259 |
| 1996 |
| 17 | EE | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
ACM Conference on Computer and Communications Security 1996: 38-47 |
| 16 | EE | Don Coppersmith,
Matthew K. Franklin,
Jacques Patarin,
Michael K. Reiter:
Low-Exponent RSA with Related Messages.
EUROCRYPT 1996: 1-9 |
| 15 | EE | Ronald Cramer,
Matthew K. Franklin,
Berry Schoenmakers,
Moti Yung:
Multi-Autority Secret-Ballot Elections with Linear Work.
EUROCRYPT 1996: 72-83 |
| 14 | EE | Matthew K. Franklin,
Michael K. Reiter:
The Design and Implementation of a Secure Auction Service.
IEEE Trans. Software Eng. 22(5): 302-312 (1996) |
| 13 | | Matthew K. Franklin,
Stuart Haber:
Joint Encryption and Message-Efficient Secure Computation.
J. Cryptology 9(4): 217-232 (1996) |
| 12 | | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
Journal of Computer Security 4(4): 267-288 (1996) |
| 1995 |
| 11 | EE | Matthew K. Franklin,
Michael K. Reiter:
Verifiable Signature Sharing.
EUROCRYPT 1995: 50-63 |
| 10 | EE | Matthew K. Franklin,
Moti Yung:
Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
STOC 1995: 36-44 |
| 1994 |
| 9 | EE | Matthew K. Franklin,
Moti Yung:
The Blinding of Weak Signatures (Extended Abstract).
EUROCRYPT 1994: 67-76 |
| 1993 |
| 8 | EE | Matthew K. Franklin,
Stuart Haber:
Joint Encryption and Message-Efficient Secure Computation.
CRYPTO 1993: 266-277 |
| 7 | | Matthew K. Franklin,
Zvi Galil,
Moti Yung:
Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
FOCS 1993: 670-679 |
| 6 | | Matthew K. Franklin,
Moti Yung:
Secure and Efficient Off-Line Digital Money (Extended Abstract).
ICALP 1993: 265-276 |
| 1992 |
| 5 | | Matthew K. Franklin,
Moti Yung:
Communication Complexity of Secure Computation (Extended Abstract)
STOC 1992: 699-710 |
| 1991 |
| 4 | | Armen Gabrielian,
Matthew K. Franklin:
Multilevel Specification of Real Time Systems.
Commun. ACM 34(5): 50-60 (1991) |
| 1990 |
| 3 | | Armen Gabrielian,
Matthew K. Franklin:
Multi-Level Specification and Verification of Real-Time Software.
ICSE 1990: 52-62 |
| 1989 |
| 2 | | Matthew K. Franklin,
Armen Gabrielian:
A Transformational Method for Verifying Safety Properties in Real-Time Systems.
IEEE Real-Time Systems Symposium 1989: 112-125 |
| 1988 |
| 1 | | Armen Gabrielian,
Matthew K. Franklin:
State-Based Specification of Complex Real-Time Systems.
IEEE Real-Time Systems Symposium 1988: 2-11 |