WorldCat Identities

Franklin, Matthew

Overview
Works: 30 works in 78 publications in 1 language and 1,347 library holdings
Genres: Conference papers and proceedings  Instructional films  Nonfiction films  Nonfiction television programs  Instructional television programs 
Roles: Author, Editor, Creator, Other
Publication Timeline
.
Most widely held works by Matthew Franklin
Financial cryptography : second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings by Rafael Hirschfeld( Book )

29 editions published between 1997 and 2002 in English and held by 267 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Financial Cryptography, FC'99, held in Anguilla, British West Indies in February 1999. The 19 revised full papers presented were carefully reviewed for inclusion in the book. The papers are organized in sections on electronic commerce, anonymity control, fraud management, public-key certificates, steganography, content distribution, anonymity mechanisms, auctions and markets, and distributed cryptography
Creating a new federal housing corporation : a summary of eight public forums on the future of FHA by William C Apgar( Book )

4 editions published in 1995 in English and held by 224 WorldCat member libraries worldwide

Classical stretch, the Esmonde technique( Visual )

1 edition published in 2010 in English and held by 160 WorldCat member libraries worldwide

Presents stretching workouts to relieve and prevent back pain
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by Juan A Garay( Book )

15 editions published in 2008 in English and held by 79 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management
Address of the American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race assembled at Philadelphia, in January, 1804, to the people of the United States by Pa.), (9th :1804 :Philadelphia, Pa.) American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race (9th :1804 :Philadelphia( )

1 edition published in 1804 in English and held by 11 WorldCat member libraries worldwide

Financial cryptography : Third International Conference, FC '99, Anguilla, British West Indies, February 22 - 25, 1999 ; proceedings by Matthew Franklin( )

2 editions published in 1999 in English and held by 10 WorldCat member libraries worldwide

Annotation
Cryptology and network security : 7th international conference : CANS 2008, Hong-Kong, China, December 2-4, 2008 by International Conference on Cryptology and Network Security( )

1 edition published in 2008 in English and held by 4 WorldCat member libraries worldwide

Classical stretch, the Esmonde Technique( Visual )

1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide

Tout le monde veut gagner en souplesse pour se sentir mieux ou améliorer sa condition physique pour accomplir au mieux les activités quotidiennes. La méthode d'entraînement de Miranda Esmonde-White, aide au renforcement des muscles et à atteindre un grand niveau de flexibilité dans un très court laps de temps pour les personnes de toute condition physique
Classical stretch, the Esmonde Technique( Visual )

1 edition published in 2009 in English and held by 2 WorldCat member libraries worldwide

Exercices d'étirement et de renforcement du programme "Classical Stretch" avec ka technique de Miranda Esmonde-White
An overview of secure distributed computing by Matthew Franklin( Book )

1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide

Abstract: "Secure distributed computing protocols allow a group of players, within some specific computational environment, to evaluate jointly the output of a function while maintaining the secrecy of privately held inputs. An oft-cited example is secret ballot election, in which a final tally must be computed without revealing anything else about the individual votes. The secrecy constraints of more general protocol problems can be satisfied by incorporating secure distributed computing (either cryptographic or unconditional) as a basic building block. This paper surveys the extensive progress that has been made in the area of secure distributed computation over the past few years."
Towards provably secure efficient electronic cash by Matthew Franklin( Book )

2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide

We present a security model for electronic coins, and prove the security of our scheme relative to certain specific cryptographic assumptions (hardness of Discrete Log and possibility of secure blind signature)."
Richard by Chuck Close( Visual )

1 edition published in 1996 in English and held by 1 WorldCat member library worldwide

Richard, a janitor at a theater, dreams of bringing the role of Richard III to life. When a feud between the play's director and star makes a fool out of Richard, he gets "mad" in more ways than one
Communication complexity of secure computation : extended abstract by Matthew Franklin( Book )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Abstract: "A secret-ballot vote for a single proposition is an example of a secure distributed computation. The goal is for n participants to jointly compute the output of some n-ary function (in this case, the sum of the votes), while protecting their individual inputs against some form of misbehavior. In this paper, we initiate the investigation of the communication complexity of unconditionally secure multi-party computation, and its relation with various fault-tolerance models. We present upper and lower bounds on communication, as well as tradeoffs among resources. First, we consider the 'direct sum problem' for communication complexity of perfectly secure protocols: Can the communication complexity of securely computing a single function f: F[superscript n] --> F at k sets of inputs be smaller if all are computed simultaneously than if each is computed individually? We show that the answer depends on the failure model. A factor of O(n/log n) can be gained in the privacy model (where processors are curious but correct); specifically, when f is n-ary addition (mod 2), we show a lower bound of [omega](n²) bits for computing f once and an upper bound of O(n² log n) for computing f O(n) times simultaneously. No gain is possible in a slightly stronger fault model (fail-stop mode); specifically, when f is n-ary addition over GF(q), we show an exact bound of [theta](kn² log q) for computing f at k sets of inputs simultaneously (for any k [> or =] 1). However, if one is willing to pay an additive cost in fault tolerance (from t to t - k + 1), then a variety of known non-cryptographic protocols (including 'provably unparallelizable' protocols from above!) can be systematically compiled to compute one function at k sets of inputs with no increase in communication complexity. Our compilation technique is based on a new compression idea of polynomial-based multi-secret sharing. Lastly, we show how to compile private protocols into error-detecting protocols at a big savings of a factor of O(n³) (up to a log factor) over the best known error-correcting protocols. This is a new notion of fault- tolerant protocols, and is especially useful when malicious behavior is infrequent, since error-detection implies error-correction in this case."
Back to Jamaica( Visual )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

Everyone wants to gain flexibility whether it's simply to feel better or to condition their body for sports and daily activites. Miranda's unique combination of dynamic stretching and eccentric strengthening has helped people of all fitness levels achieve great flexibility in a very short period of time
Address of the American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race : assembled at Philadelphia, in January, 1804 : to the people of the United States by American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race( Book )

1 edition published in 1804 in English and held by 1 WorldCat member library worldwide

Back to Jamaica( Visual )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

Everyone wants to gain flexibility whether it's simply to feel better or to condition their body for sports and daily activites. Miranda's unique combination of dynamic stretching and eccentric strengthening has helped people of all fitness levels achieve great flexibility in a very short period of time
Advances in cryptology proceedings by EUROCRYPT (Conference)( Book )

2 editions published in 2004 in English and held by 1 WorldCat member library worldwide

This book constitutes the refereed proceedings of the 24th Annual International Cryptology Conference, CRYPTO 2004, held in Santa Barbara, California, USA in August 2004. The 33 revised full papers presented together with one invited paper were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections in linear cryptanalysis, group signatures, foundations, efficient representations, public key cryptanalysis, zero-knowledge, hash collision, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management, and computationally unbounded adversaries
The Lessons Learned in the Application of Augmented Reality( )

1 edition published in 2006 in English and held by 0 WorldCat member libraries worldwide

The purpose of this paper is to provide an overview of the lessons learned from research conducted on behalf of the UK MoD into the application of Augmented Reality (AR) technologies. The lessons learned include technological and procedural aspects discovered during the preliminary research, user field trials and subsequent feedback. The paper is primarily focused on the application of AR in the training domain and in particular the use of AR to support Forward Air Controller training. However, the lessons learned also apply to the use of AR in operational and test and evaluation domains
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings by David Hutchison( )

1 edition published in 2008 in Undetermined and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.53 (from 0.17 for Classical ... to 0.99 for The Lesson ...)

Financial cryptography : second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedingsFinancial cryptography : Third International Conference, FC '99, Anguilla, British West Indies, February 22 - 25, 1999 ; proceedings
Alternative Names
Franklin Matt

Franklin, Matthew

Franklin, Matthew K.

Matt Franklin US-amerikanischer Kryptograph und Informatiker

Matthew K. Franklin Amerikaans wiskundige

Matthew K. Franklin informaticien américain

متیو کی. فرانکلین ریاضی‌دان و دانشمند علوم کامپیوتر آمریکایی

Languages
English (67)

Covers
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedingsFinancial cryptography : Third International Conference, FC '99, Anguilla, British West Indies, February 22 - 25, 1999 ; proceedingsCryptology and network security : 7th international conference : CANS 2008, Hong-Kong, China, December 2-4, 2008Advances in cryptology proceedingsCryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings