Name
Papers
Collaborators
MATTHEW K. FRANKLIN
35
43
Citations 
PageRank 
Referers 
959
119.11
1652
Referees 
References 
419
396
Search Limit
1001000
Title
Citations
PageRank
Year
Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays.40.452016
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.00.342013
Unique Ring Signatures: A Practical Construction.70.652013
A Framework for Unique Ring Signatures.40.482012
Unique Group Signatures.40.392012
Efficient and secure evaluation of multivariate polynomials and applications40.392010
Fair Threshold Decryption with Semi-Trusted Third Parties00.342009
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings221.242008
A survey of key evolving cryptosystems150.562006
Edge Eavesdropping Games10.352006
Byzantine Agreement Given Partial Broadcast191.082005
A Generic Construction for Intrusion-Resilient Public-Key Encryption361.712004
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings3212.172004
Cryptology As a Network Service130.912001
Commital Deniable Proofs and Electronic Campaign Finance30.432000
Distribution chain security70.572000
An Efficient Public Key Traitor Tracing Scheme15914.501999
Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings163.441999
Self-Testing/Correcting Protocols (Extended Abstract)20.421999
Mutual Search (Extended Abstract)00.341998
Secure Communication in Minimal Connectivity Models181.321998
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties391.821998
Fair exchange with a semi-trusted third party (extended abstract)9813.551997
Auditable metering with lighweight security5210.371997
Efficient Generation of Shared RSA Keys (Extended Abstract)949.561997
Joint Encryption and Message-Efficient Secure Computation.00.341996
The &OHgr; key management service204.541996
Multi-Autority Secret-Ballot Elections with Linear Work.190.921996
Secure hypergraphs: privacy from partial broadcast (Extended Abstract)70.581995
Verifiable Signature Sharing328.671995
The Blinding of Weak Signatures (Extended Abstract)30.691994
Secure and Efficient Off-Line Digital Money (Extended Abstract)386.081993
Communication complexity of secure computation (extended abstract)1098.631992
Multilevel specification of real time systems7510.161991
State-based specification of complex real-time systems71.171988