Identity-based encryption from the Weil pairing D Boneh, M Franklin Annual international cryptology conference, 213-229, 2001 | 11446 | 2001 |
Identity-based encryption from the Weil pairing D Boneh, M Franklin SIAM journal on computing 32 (3), 586-615, 2003 | 3394 | 2003 |
An algebraic approach to IP traceback D Dean, M Franklin, A Stubblefield ACM Transactions on Information and System Security (TISSEC) 5 (2), 119-137, 2002 | 685 | 2002 |
Multi-authority secret-ballot elections with linear work R Cramer, M Franklin, B Schoenmakers, M Yung International Conference on the Theory and Applications of Cryptographic …, 1996 | 558 | 1996 |
The design and implementation of a secure auction service MK Franklin, MK Reiter IEEE Transactions on Software Engineering 22 (5), 302-312, 1996 | 549 | 1996 |
Efficient generation of shared RSA keys D Boneh, M Franklin Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997 | 523 | 1997 |
An efficient public key traitor tracing scheme D Boneh, M Franklin Annual International Cryptology Conference, 338-353, 1999 | 486 | 1999 |
Fair exchange with a semi-trusted third party MK Franklin, MK Reiter Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 456 | 1997 |
Secure auction systems MK Franklin, MK Reiter US Patent 6,055,518, 2000 | 388 | 2000 |
Systems and methods for identity-based encryption and related cryptographic techniques D Boneh, M Franklin US Patent 7,113,594, 2006 | 385 | 2006 |
Communication complexity of secure computation M Franklin, M Yung Proceedings of the twenty-fourth annual ACM symposium on Theory of computing …, 1992 | 383 | 1992 |
Self-healing key distribution with revocation J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002 | 306 | 2002 |
Enhancing privacy and trust in electronic communities BA Huberman, M Franklin, T Hogg Proceedings of the 1st ACM conference on Electronic commerce, 78-86, 1999 | 300 | 1999 |
Fast and interactive analytics over Hadoop data with Spark M Zaharia, M Chowdhury, T Das, A Dave, J Ma, M Mccauley, M Franklin, ... Usenix Login 37 (4), 45-51, 2012 | 276 | 2012 |
Low-exponent RSA with related messages D Coppersmith, M Franklin, J Patarin, M Reiter International Conference on the Theory and Applications of Cryptographic …, 1996 | 276 | 1996 |
Efficient generation of shared RSA keys D Boneh, M Franklin Journal of the ACM (JACM) 48 (4), 702-722, 2001 | 233 | 2001 |
Secure and efficient off-line digital money M Franklin, M Yung International Colloquium on Automata, Languages, and Programming, 265-276, 1993 | 199 | 1993 |
Efficiency tradeoffs for malicious two-party computation P Mohassel, M Franklin Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 193 | 2006 |
Secure communication in minimal connectivity models M Franklin, RN Wright Journal of Cryptology 13, 9-30, 2000 | 152 | 2000 |
Joint encryption and message-efficient secure computation M Franklin, S Haber Journal of Cryptology 9, 217-232, 1996 | 145 | 1996 |