BibTeX records: Matthew K. Franklin

download as .bib file

@article{DBLP:journals/mis/LeeKF16,
  author       = {Mun{-}Kyu Lee and
                  Jin Bok Kim and
                  Matthew K. Franklin},
  title        = {Enhancing the Security of Personal Identification Numbers with Three-Dimensional
                  Displays},
  journal      = {Mob. Inf. Syst.},
  volume       = {2016},
  pages        = {8019830:1--8019830:9},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/8019830},
  doi          = {10.1155/2016/8019830},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/LeeKF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FranklinGOS15,
  author       = {Matthew K. Franklin and
                  Ran Gelles and
                  Rafail Ostrovsky and
                  Leonard J. Schulman},
  title        = {Optimal Coding for Streaming Authentication and Interactive Communication},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {1},
  pages        = {133--145},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2014.2367094},
  doi          = {10.1109/TIT.2014.2367094},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/FranklinGOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChowFZ14,
  author       = {Sherman S. M. Chow and
                  Matthew K. Franklin and
                  Haibin Zhang},
  editor       = {Josh Benaloh},
  title        = {Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability,
                  and Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_5},
  doi          = {10.1007/978-3-319-04852-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChowFZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcce/LeeKF14,
  author       = {Mun{-}Kyu Lee and
                  Jin Bok Kim and
                  Matthew K. Franklin},
  title        = {3DPIN: Enhancing security with 3D display},
  booktitle    = {{IEEE} 3rd Global Conference on Consumer Electronics, {GCCE} 2014,
                  Tokyo, Japan, 7-10 October 2014},
  pages        = {129--130},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GCCE.2014.7031090},
  doi          = {10.1109/GCCE.2014.7031090},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/gcce/LeeKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FranklinGOS13,
  author       = {Matthew K. Franklin and
                  Ran Gelles and
                  Rafail Ostrovsky and
                  Leonard J. Schulman},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Optimal Coding for Streaming Authentication and Interactive Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {258--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_15},
  doi          = {10.1007/978-3-642-40084-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FranklinGOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FranklinZ13,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Unique Ring Signatures: {A} Practical Construction},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {162--170},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_13},
  doi          = {10.1007/978-3-642-39884-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FranklinZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowFZ13,
  author       = {Sherman S. M. Chow and
                  Matthew K. Franklin and
                  Haibin Zhang},
  title        = {Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability,
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowFZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavisCF12,
  author       = {Benjamin Davis and
                  Hao Chen and
                  Matthew K. Franklin},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Privacy-preserving alibi systems},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {34--35},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414475},
  doi          = {10.1145/2414456.2414475},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DavisCF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FranklinZ12,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Unique Group Signatures},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {643--660},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_37},
  doi          = {10.1007/978-3-642-33167-1\_37},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FranklinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/FranklinGOS12,
  author       = {Matthew K. Franklin and
                  Ran Gelles and
                  Rafail Ostrovsky and
                  Leonard J. Schulman},
  title        = {Optimal Coding for Streaming Authentication and Interactive Communication},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-104}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/104},
  eprinttype    = {ECCC},
  eprint       = {TR12-104},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/FranklinGOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinZ12,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  title        = {Unique Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinZ12a,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  title        = {A Framework for Unique Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Franklin11,
  author       = {Matthew K. Franklin},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Mix Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {786--788},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_209},
  doi          = {10.1007/978-1-4419-5906-5\_209},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Franklin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HongKKFP10,
  author       = {Jeongdae Hong and
                  Jinil Kim and
                  Jihye Kim and
                  Matthew K. Franklin and
                  Kunsoo Park},
  title        = {Fair threshold decryption with semi-trusted third parties},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {139--153},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038307},
  doi          = {10.1504/IJACT.2010.038307},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HongKKFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FranklinM10,
  author       = {Matthew K. Franklin and
                  Payman Mohassel},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Efficient and Secure Evaluation of Multivariate Polynomials and Applications},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {236--254},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_15},
  doi          = {10.1007/978-3-642-13708-2\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FranklinM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HongKKFP09,
  author       = {Jeongdae Hong and
                  Jinil Kim and
                  Jihye Kim and
                  Matthew K. Franklin and
                  Kunsoo Park},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Fair Threshold Decryption with Semi-Trusted Third Parties},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {309--326},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_22},
  doi          = {10.1007/978-3-642-02620-1\_22},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HongKKFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FranklinGM09,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  editor       = {Marc Fischlin},
  title        = {Communication-Efficient Private Protocols for Longest Common Subsequence},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {265--278},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_18},
  doi          = {10.1007/978-3-642-00862-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FranklinGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinGM09,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  title        = {Communication-Efficient Private Protocols for Longest Common Subsequence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2008,
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8},
  doi          = {10.1007/978-3-540-89641-8},
  isbn         = {978-3-540-89640-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FranklinGM07,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  editor       = {Kaoru Kurosawa},
  title        = {Multi-party Indirect Indexing and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_17},
  doi          = {10.1007/978-3-540-76900-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FranklinGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FranklinGM07,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  editor       = {Masayuki Abe},
  title        = {Improved Efficiency for Private Stable Matching},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_11},
  doi          = {10.1007/11967668\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FranklinGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelF07,
  author       = {Amos Beimel and
                  Matthew K. Franklin},
  editor       = {Salil P. Vadhan},
  title        = {Weakly-Private Secret Sharing Schemes},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_14},
  doi          = {10.1007/978-3-540-70936-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiltzMWF07,
  author       = {Eike Kiltz and
                  Payman Mohassel and
                  Enav Weinreb and
                  Matthew K. Franklin},
  editor       = {Salil P. Vadhan},
  title        = {Secure Linear Algebra Using Linearly Recurrent Sequences},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_16},
  doi          = {10.1007/978-3-540-70936-7\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiltzMWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FitziFGV07,
  author       = {Matthias Fitzi and
                  Matthew K. Franklin and
                  Juan A. Garay and
                  Harsha Vardhan Simhadri},
  editor       = {Salil P. Vadhan},
  title        = {Towards Optimal and Efficient Perfectly Secure Message Transmission},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {311--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_17},
  doi          = {10.1007/978-3-540-70936-7\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FitziFGV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinGM07,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  title        = {Multi-Party Indirect Indexing and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Franklin06,
  author       = {Matthew K. Franklin},
  title        = {A survey of key evolving cryptosystems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {46--53},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010822},
  doi          = {10.1504/IJSN.2006.010822},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Franklin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MohasselF06,
  author       = {Payman Mohassel and
                  Matthew K. Franklin},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Efficient Polynomial Operations in the Shared-Coefficients Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_4},
  doi          = {10.1007/11745853\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MohasselF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MohasselF06a,
  author       = {Payman Mohassel and
                  Matthew K. Franklin},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Efficiency Tradeoffs for Malicious Two-Party Computation},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {458--473},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_30},
  doi          = {10.1007/11745853\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MohasselF06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BeimelF06,
  author       = {Amos Beimel and
                  Matthew K. Franklin},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Edge Eavesdropping Games},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_1},
  doi          = {10.1007/11832072\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BeimelF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinGM06,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  title        = {Improved Efficiency for Private Stable Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ConsidineFFLMM05,
  author       = {Jeffrey Considine and
                  Matthias Fitzi and
                  Matthew K. Franklin and
                  Leonid A. Levin and
                  Ueli M. Maurer and
                  David Metcalf},
  title        = {Byzantine Agreement Given Partial Broadcast},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {3},
  pages        = {191--217},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-005-0308-x},
  doi          = {10.1007/S00145-005-0308-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ConsidineFFLMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Franklin05,
  author       = {Matthew K. Franklin},
  editor       = {Henk C. A. van Tilborg},
  title        = {Mix Networks},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_257},
  doi          = {10.1007/0-387-23483-7\_257},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Franklin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/FranklinY04,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  title        = {Secure Hypergraphs: Privacy from Partial Broadcast},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {18},
  number       = {3},
  pages        = {437--450},
  year         = {2004},
  url          = {https://doi.org/10.1137/S0895480198335215},
  doi          = {10.1137/S0895480198335215},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/FranklinY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto},
  title        = {A Generic Construction for Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_7},
  doi          = {10.1007/978-3-540-24660-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2004,
  editor       = {Matthew K. Franklin},
  title        = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99099},
  doi          = {10.1007/B99099},
  isbn         = {3-540-22668-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/BonehF03,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity-Based Encryption from the Weil Pairing},
  journal      = {{SIAM} J. Comput.},
  volume       = {32},
  number       = {3},
  pages        = {586--615},
  year         = {2003},
  url          = {https://doi.org/10.1137/S0097539701398521},
  doi          = {10.1137/S0097539701398521},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/BonehF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Marc Joye},
  title        = {Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_2},
  doi          = {10.1007/3-540-36563-X\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DeanFS02,
  author       = {Drew Dean and
                  Matthew K. Franklin and
                  Adam Stubblefield},
  title        = {An algebraic approach to {IP} traceback},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {119--137},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505588},
  doi          = {10.1145/505586.505588},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DeanFS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StaddonMFBMD02,
  author       = {Jessica Staddon and
                  Sara K. Miner and
                  Matthew K. Franklin and
                  Dirk Balfanz and
                  Michael Malkin and
                  Drew Dean},
  title        = {Self-Healing Key Distribution with Revocation},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {241--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004375},
  doi          = {10.1109/SECPRI.2002.1004375},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/StaddonMFBMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Efficient generation of shared {RSA} keys},
  journal      = {J. {ACM}},
  volume       = {48},
  number       = {4},
  pages        = {702--722},
  year         = {2001},
  url          = {https://doi.org/10.1145/502090.502094},
  doi          = {10.1145/502090.502094},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BonehF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Joe Kilian},
  title        = {Identity-Based Encryption from the Weil Pairing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_13},
  doi          = {10.1007/3-540-44647-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehDF01,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Matthew K. Franklin},
  editor       = {Birgit Pfitzmann},
  title        = {Lower Bounds for Multicast Message Authentication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {437--452},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_27},
  doi          = {10.1007/3-540-44987-6\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehDF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BersonDFSS01,
  author       = {Tom Berson and
                  Drew Dean and
                  Matthew K. Franklin and
                  Diana K. Smetters and
                  Mike Spreitzer},
  title        = {Cryptology As a Network Service},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/cryptology-network-service/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BersonDFSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DeanFS01,
  author       = {Drew Dean and
                  Matthew K. Franklin and
                  Adam Stubblefield},
  title        = {An Algebraic Approach to {IP} Traceback},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/algebraic-approach-ip-traceback/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DeanFS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity Based Encryption From the Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/FranklinGY00,
  author       = {Matthew K. Franklin and
                  Zvi Galil and
                  Moti Yung},
  title        = {Eavesdropping games: a graph-theoretic approach to privacy in distributed
                  systems},
  journal      = {J. {ACM}},
  volume       = {47},
  number       = {2},
  pages        = {225--243},
  year         = {2000},
  url          = {https://doi.org/10.1145/333979.333980},
  doi          = {10.1145/333979.333980},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/FranklinGY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FranklinW00,
  author       = {Matthew K. Franklin and
                  Rebecca N. Wright},
  title        = {Secure Communication in Minimal Connectivity Models},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {9--30},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001459910002},
  doi          = {10.1007/S001459910002},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FranklinW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FranklinS00,
  author       = {Matthew K. Franklin and
                  Tomas Sander},
  editor       = {Tatsuaki Okamoto},
  title        = {Commital Deniable Proofs and Electronic Campaign Finance},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {373--387},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_28},
  doi          = {10.1007/3-540-44448-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FranklinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DurfeeF00,
  author       = {Glenn Durfee and
                  Matthew K. Franklin},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Distribution chain security},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352610},
  doi          = {10.1145/352600.352610},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DurfeeF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/FranklinS00,
  author       = {Matthew K. Franklin and
                  Tomas Sander},
  editor       = {Lorrie Faith Cranor},
  title        = {Deniable payments and electronic campaign finance},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {67--68},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332249},
  doi          = {10.1145/332186.332249},
  timestamp    = {Mon, 23 May 2022 11:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/FranklinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/HoggHF00,
  author       = {Tad Hogg and
                  Bernardo A. Huberman and
                  Matthew K. Franklin},
  editor       = {Lorrie Faith Cranor},
  title        = {Protecting privacy while sharing information in electronic communities},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {73--75},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332251},
  doi          = {10.1145/332186.332251},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/HoggHF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BuhrmanFGHTV99,
  author       = {Harry Buhrman and
                  Matthew K. Franklin and
                  Juan A. Garay and
                  Jaap{-}Henk Hoepman and
                  John Tromp and
                  Paul M. B. Vit{\'{a}}nyi},
  title        = {Mutual Search},
  journal      = {J. {ACM}},
  volume       = {46},
  number       = {4},
  pages        = {517--536},
  year         = {1999},
  url          = {https://doi.org/10.1145/320211.320232},
  doi          = {10.1145/320211.320232},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BuhrmanFGHTV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BeimelF99,
  author       = {Amos Beimel and
                  Matthew K. Franklin},
  title        = {Reliable Communication over Partially Authenticated Networks},
  journal      = {Theor. Comput. Sci.},
  volume       = {220},
  number       = {1},
  pages        = {185--210},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0304-3975(98)00241-2},
  doi          = {10.1016/S0304-3975(98)00241-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BeimelF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Anonymous Authentication with Subset Queries (extended abstract)},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {113--119},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319725},
  doi          = {10.1145/319709.319725},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BonehF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Michael J. Wiener},
  title        = {An Efficient Public Key Traitor Tracing Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_22},
  doi          = {10.1007/3-540-48405-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/HubermanFH99,
  author       = {Bernardo A. Huberman and
                  Matthew K. Franklin and
                  Tad Hogg},
  editor       = {Stuart I. Feldman and
                  Michael P. Wellman},
  title        = {Enhancing privacy and trust in electronic communities},
  booktitle    = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99),
                  Denver, CO, USA, November 3-5, 1999},
  pages        = {78--86},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/336992.337012},
  doi          = {10.1145/336992.337012},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/HubermanFH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/FranklinGY99,
  author       = {Matthew K. Franklin and
                  Juan A. Garay and
                  Moti Yung},
  editor       = {Prasad Jayanti},
  title        = {Self-Testing/Correcting Protocols (Extended Abstract)},
  booktitle    = {Distributed Computing, 13th International Symposium, Bratislava, Slovak
                  Republic, September 27-29, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1693},
  pages        = {269--283},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48169-9\_19},
  doi          = {10.1007/3-540-48169-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/FranklinGY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor       = {Matthew K. Franklin},
  title        = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X},
  doi          = {10.1007/3-540-48390-X},
  isbn         = {3-540-66362-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DS-9902005,
  author       = {Harry Buhrman and
                  Matthew K. Franklin and
                  Juan A. Garay and
                  Jaap{-}Henk Hoepman and
                  John Tromp and
                  Paul M. B. Vit{\'{a}}nyi},
  title        = {Mutual Search},
  journal      = {CoRR},
  volume       = {cs.DS/9902005},
  year         = {1999},
  url          = {https://arxiv.org/abs/cs/9902005},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-DS-9902005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FranklinM98,
  author       = {Matthew K. Franklin and
                  Dahlia Malkhi},
  title        = {Auditable Metering with Lightweight Security},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {237--256},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-1998-6402},
  doi          = {10.3233/JCS-1998-6402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FranklinM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinW98,
  author       = {Matthew K. Franklin and
                  Rebecca N. Wright},
  editor       = {Kaisa Nyberg},
  title        = {Secure Communications in Minimal Connectivity Models},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054138},
  doi          = {10.1007/BFB0054138},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FranklinW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FranklinT98,
  author       = {Matthew K. Franklin and
                  Gene Tsudik},
  editor       = {Rafael Hirschfeld},
  title        = {Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral
                  Parties},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {90--102},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055475},
  doi          = {10.1007/BFB0055475},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FranklinT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BuhrmanFGHTV98,
  author       = {Harry Buhrman and
                  Matthew K. Franklin and
                  Juan A. Garay and
                  Jaap{-}Henk Hoepman and
                  John Tromp and
                  Paul M. B. Vit{\'{a}}nyi},
  editor       = {Howard J. Karloff},
  title        = {Mutual Search (Extended Abstract)},
  booktitle    = {Proceedings of the Ninth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  25-27 January 1998, San Francisco, California, {USA}},
  pages        = {481--489},
  publisher    = {{ACM/SIAM}},
  year         = {1998},
  url          = {http://dl.acm.org/citation.cfm?id=314613.314831},
  timestamp    = {Thu, 05 Jul 2018 07:29:49 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/BuhrmanFGHTV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FranklinR97,
  author       = {Matthew K. Franklin and
                  Michael K. Reiter},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Fair Exchange with a Semi-Trusted Third Party (extended abstract)},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266424},
  doi          = {10.1145/266420.266424},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FranklinR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF97,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Efficient Generation of Shared {RSA} Keys (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {425--439},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052253},
  doi          = {10.1007/BFB0052253},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FranklinM97,
  author       = {Matthew K. Franklin and
                  Dahlia Malkhi},
  editor       = {Rafael Hirschfeld},
  title        = {Auditable Metering with Lightweight Security},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_75},
  doi          = {10.1007/3-540-63594-7\_75},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FranklinM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/BeimelF97,
  author       = {Amos Beimel and
                  Matthew K. Franklin},
  editor       = {Marios Mavronicolas and
                  Philippas Tsigas},
  title        = {Reliable Communication over Partially Authenticated Networks},
  booktitle    = {Distributed Algorithms, 11th International Workshop, {WDAG} '97, Saarbr{\"{u}}cken,
                  Germany, September 24-26, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1320},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030688},
  doi          = {10.1007/BFB0030688},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/BeimelF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ReiterFLW96,
  author       = {Michael K. Reiter and
                  Matthew K. Franklin and
                  John B. Lacy and
                  Rebecca N. Wright},
  title        = {The Omega Key Management Service},
  journal      = {J. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {267--288},
  year         = {1996},
  url          = {https://doi.org/10.3233/JCS-1996-4402},
  doi          = {10.3233/JCS-1996-4402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ReiterFLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FranklinH96,
  author       = {Matthew K. Franklin and
                  Stuart Haber},
  title        = {Joint Encryption and Message-Efficient Secure Computation},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {217--232},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00189261},
  doi          = {10.1007/BF00189261},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FranklinH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/FranklinR96,
  author       = {Matthew K. Franklin and
                  Michael K. Reiter},
  title        = {The Design and Implementation of a Secure Auction Service},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {5},
  pages        = {302--312},
  year         = {1996},
  url          = {https://doi.org/10.1109/32.502223},
  doi          = {10.1109/32.502223},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/FranklinR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterFLW96,
  author       = {Michael K. Reiter and
                  Matthew K. Franklin and
                  John B. Lacy and
                  Rebecca N. Wright},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {The Omega Key Management Service},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238184},
  doi          = {10.1145/238168.238184},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoppersmithFPR96,
  author       = {Don Coppersmith and
                  Matthew K. Franklin and
                  Jacques Patarin and
                  Michael K. Reiter},
  editor       = {Ueli M. Maurer},
  title        = {Low-Exponent {RSA} with Related Messages},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_1},
  doi          = {10.1007/3-540-68339-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoppersmithFPR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96,
  author       = {Ronald Cramer and
                  Matthew K. Franklin and
                  Berry Schoenmakers and
                  Moti Yung},
  editor       = {Ueli M. Maurer},
  title        = {Multi-Autority Secret-Ballot Elections with Linear Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_7},
  doi          = {10.1007/3-540-68339-9\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinR95,
  author       = {Matthew K. Franklin and
                  Michael K. Reiter},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Verifiable Signature Sharing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {50--63},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_5},
  doi          = {10.1007/3-540-49264-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FranklinR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FranklinR95,
  author       = {Matthew K. Franklin and
                  Michael K. Reiter},
  title        = {The design and implementation of a secure auction service},
  booktitle    = {Proceedings of the 1995 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 8-10, 1995},
  pages        = {2--14},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/SECPRI.1995.398918},
  doi          = {10.1109/SECPRI.1995.398918},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FranklinR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FranklinY95,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Secure hypergraphs: privacy from partial broadcast (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {36--44},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225077},
  doi          = {10.1145/225058.225077},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FranklinY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinY94,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Alfredo De Santis},
  title        = {The Blinding of Weak Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053425},
  doi          = {10.1007/BFB0053425},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FranklinY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FranklinH93,
  author       = {Matthew K. Franklin and
                  Stuart Haber},
  editor       = {Douglas R. Stinson},
  title        = {Joint Encryption and Message-Efficient Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {266--277},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_23},
  doi          = {10.1007/3-540-48329-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FranklinH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FranklinGY93,
  author       = {Matthew K. Franklin and
                  Zvi Galil and
                  Moti Yung},
  title        = {Eavesdropping Games: {A} Graph-Theoretic Approach to Privacy in Distributed
                  Systems},
  booktitle    = {34th Annual Symposium on Foundations of Computer Science, Palo Alto,
                  California, USA, 3-5 November 1993},
  pages        = {670--679},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/SFCS.1993.366820},
  doi          = {10.1109/SFCS.1993.366820},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/FranklinGY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FranklinY93,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Andrzej Lingas and
                  Rolf G. Karlsson and
                  Svante Carlsson},
  title        = {Secure and Efficient Off-Line Digital Money (Extended Abstract)},
  booktitle    = {Automata, Languages and Programming, 20nd International Colloquium,
                  ICALP93, Lund, Sweden, July 5-9, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {700},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56939-1\_78},
  doi          = {10.1007/3-540-56939-1\_78},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FranklinY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FranklinY92,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {S. Rao Kosaraju and
                  Mike Fellows and
                  Avi Wigderson and
                  John A. Ellis},
  title        = {Communication Complexity of Secure Computation (Extended Abstract)},
  booktitle    = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing,
                  May 4-6, 1992, Victoria, British Columbia, Canada},
  pages        = {699--710},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/129712.129780},
  doi          = {10.1145/129712.129780},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FranklinY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GabrielianF91,
  author       = {Armen Gabrielian and
                  Matthew K. Franklin},
  title        = {Multilevel Specification of Real Time Systems},
  journal      = {Commun. {ACM}},
  volume       = {34},
  number       = {5},
  pages        = {50--60},
  year         = {1991},
  url          = {https://doi.org/10.1145/103167.103173},
  doi          = {10.1145/103167.103173},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GabrielianF91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GabrielianF90,
  author       = {Armen Gabrielian and
                  Matthew K. Franklin},
  editor       = {Fran{\c{c}}ois{-}R{\'{e}}gis Valette and
                  Peter A. Freeman and
                  Marie{-}Claude Gaudel},
  title        = {Multi-Level Specification and Verification of Real-Time Software},
  booktitle    = {Proceedings of the 12th International Conference on Software Engineering,
                  Nice, France, March 26-30, 1990},
  pages        = {52--62},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {http://dl.acm.org/citation.cfm?id=100302},
  timestamp    = {Mon, 14 May 2012 18:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/GabrielianF90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtss/FranklinG89,
  author       = {Matthew K. Franklin and
                  Armen Gabrielian},
  title        = {A Transformational Method for Verifying Safety Properties in Real-Time
                  Systems},
  booktitle    = {Proceedings of the Real-Time Systems Symposium - 1989, Santa Monica,
                  California, USA, December 1989},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/REAL.1989.63562},
  doi          = {10.1109/REAL.1989.63562},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtss/FranklinG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtss/GabrielianF88,
  author       = {Armen Gabrielian and
                  Matthew K. Franklin},
  title        = {State-Based Specification of Complex Real-Time Systems},
  booktitle    = {Proceedings of the 9th {IEEE} Real-Time Systems Symposium {(RTSS}
                  '88), December 6-8, 1988, Huntsville, Alabama, {USA}},
  pages        = {2--11},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/REAL.1988.51095},
  doi          = {10.1109/REAL.1988.51095},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtss/GabrielianF88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics