Identity-based encryption from the Weil pairing D Boneh, M Franklin Annual international cryptology conference, 213-229, 2001 | 9868 | 2001 |
Identity-based encryption from the Weil pairing D Boneh, M Franklin SIAM journal on computing 32 (3), 586-615, 2003 | 2979 | 2003 |
Broadcast disks: Data management for asymmetric communication environments S Acharya, R Alonso, M Franklin, S Zdonik Mobile Computing, 331-361, 1995 | 1428 | 1995 |
An algebraic approach to IP traceback D Dean, M Franklin, A Stubblefield ACM Transactions on Information and System Security (TISSEC) 5 (2), 119-137, 2002 | 663 | 2002 |
Multi-authority secret-ballot elections with linear work R Cramer, M Franklin, B Schoenmakers, M Yung International Conference on the Theory and Applications of Cryptographic …, 1996 | 494 | 1996 |
The design and implementation of a secure auction service MK Franklin, MK Reiter IEEE Transactions on Software Engineering 22 (5), 302-312, 1996 | 494 | 1996 |
Efficient generation of shared RSA keys D Boneh, M Franklin Annual international cryptology conference, 425-439, 1997 | 459 | 1997 |
An efficient public key traitor tracing scheme D Boneh, M Franklin Annual International Cryptology Conference, 338-353, 1999 | 427 | 1999 |
Fair exchange with a semi-trusted third party MK Franklin, MK Reiter Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 394 | 1997 |
Systems and methods for identity-based encryption and related cryptographic techniques D Boneh, M Franklin US Patent 7,113,594, 2006 | 363 | 2006 |
Secure auction systems MK Franklin, MK Reiter US Patent 6,055,518, 2000 | 362 | 2000 |
Self-healing key distribution with revocation J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002 | 297 | 2002 |
Communication complexity of secure computation M Franklin, M Yung Proceedings of the twenty-fourth annual ACM symposium on Theory of computing …, 1992 | 274 | 1992 |
Low-exponent RSA with related messages D Coppersmith, M Franklin, J Patarin, M Reiter International Conference on the Theory and Applications of Cryptographic …, 1996 | 249 | 1996 |
Fast and interactive analytics over Hadoop data with Spark M Zaharia, M Chowdhury, T Das, A Dave, J Ma, M Mccauley, M Franklin, ... Usenix Login 37 (4), 45-51, 2012 | 210 | 2012 |
Efficient generation of shared RSA keys D Boneh, M Franklin Journal of the ACM (JACM) 48 (4), 702-722, 2001 | 204 | 2001 |
Secure and efficient off-line digital money M Franklin, M Yung International Colloquium on Automata, Languages, and Programming, 265-276, 1993 | 193 | 1993 |
Enhancing privacy and trust in electronic communities BA Huberman, M Franklin, T Hogg Proceedings of the 1st ACM conference on Electronic commerce, 78-86, 1999 | 191 | 1999 |
Efficiency tradeoffs for malicious two-party computation P Mohassel, M Franklin International Workshop on Public Key Cryptography, 458-473, 2006 | 165 | 2006 |
Search for third generation scalar leptoquarks in pp collisions at TeV with the ATLAS detector G Aad, T Abajyan, B Abbott, J Abdallah, SA Khalek, AA Abdelalim, ... Journal of High Energy Physics 2013 (6), 33, 2013 | 160 | 2013 |