WorldCat Identities

Franklin, Matthew

Overview
Works: 26 works in 44 publications in 1 language and 893 library holdings
Genres: Conference papers and proceedings  Instructional films  Nonfiction films 
Roles: Author, Editor, Other
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Matthew Franklin
Creating a new federal housing corporation : a summary of eight public forums on the future of FHA by William C Apgar( Book )

2 editions published in 1995 in English and held by 222 WorldCat member libraries worldwide

Classical stretch, the Esmonde technique( Visual )

1 edition published in 2010 in English and held by 112 WorldCat member libraries worldwide

Presents stretching workouts to relieve and prevent back pain
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by Feng Bao( Book )

13 editions published in 2008 in English and held by 58 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
Address of the American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race assembled at Philadelphia, in January, 1804, to the people of the United States by Pa.), (9th :1804 :Philadelphia, Pa.) American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race (9th :1804 :Philadelphia( )

1 edition published in 1804 in English and held by 11 WorldCat member libraries worldwide

Creating a new federal housing corproration : a summary of eight public forums on the future of FHA by William C Apgar( Book )

2 editions published in 1995 in English and held by 10 WorldCat member libraries worldwide

Classical stretch : the Esmonde technique( Visual )

2 editions published in 2009 in English and held by 5 WorldCat member libraries worldwide

Tout le monde veut gagner en souplesse pour se sentir mieux ou améliorer sa condition physique pour accomplir au mieux les activités quotidiennes. La méthode d'entraînement de Miranda Esmonde-White, aide au renforcement des muscles et à atteindre un grand niveau de flexibilité dans un très court laps de temps pour les personnes de toute condition physique
Peptide : a protein building game by John J Coveyou( Visual )

1 edition published in 2015 in English and held by 4 WorldCat member libraries worldwide

"A genetics-based open-drafting card game, with an element of resource management. Peptide is accurately themed around the process of RNA Translation, which is how living cells turn genetic material into proteins!" -- box
Ion : a compound building game by John J Coveyou( Visual )

1 edition published in 2015 in English and held by 4 WorldCat member libraries worldwide

"A card-drafting game about building compounds. Players are given a hand of ion and elements cards, and must select one of those cards either to bond to a card already on the table, or set it alone. Players then pass their remaining hand of cards to an opposing player to start the process over again. Points are scored based upon the type and quantity of neutrally-balanced compounds players are able to construct, and upon sets of noble gases they are able to collect." -- container
An overview of secure distributed computing by Matthew Franklin( Book )

1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide

Abstract: "Secure distributed computing protocols allow a group of players, within some specific computational environment, to evaluate jointly the output of a function while maintaining the secrecy of privately held inputs. An oft-cited example is secret ballot election, in which a final tally must be computed without revealing anything else about the individual votes. The secrecy constraints of more general protocol problems can be satisfied by incorporating secure distributed computing (either cryptographic or unconditional) as a basic building block. This paper surveys the extensive progress that has been made in the area of secure distributed computation over the past few years."
Towards provably secure efficient electronic cash : extended abstract by Matthew Franklin( Book )

2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide

We present a security model for electronic coins, and prove the security of our scheme relative to certain specific cryptographic assumptions (hardness of Discrete Log and possibility of secure blind signature)."
Back to Jamaica( Visual )

2 editions published in 2009 in English and held by 2 WorldCat member libraries worldwide

Everyone wants to gain flexibility whether it's simply to feel better or to condition their body for sports and daily activites. Miranda's unique combination of dynamic stretching and eccentric strengthening has helped people of all fitness levels achieve great flexibility in a very short period of time
Secure group barter: multi-party fair exchange with semi-trusted neutral parties by Matthew Franklin( )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedings by Matt Franklin( Book )

1 edition published in 2004 in English and held by 1 WorldCat member library worldwide

This book constitutes the refereed proceedings of the 24th Annual International Cryptology Conference, CRYPTO 2004, held in Santa Barbara, California, USA in August 2004. The 33 revised full papers presented together with one invited paper were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections in linear cryptanalysis, group signatures, foundations, efficient representations, public key cryptanalysis, zero-knowledge, hash collision, secure computation, stream cipher cryptanalysis, public key encryption, bounded storage model, key management, and computationally unbounded adversaries
Richard( Visual )

1 edition published in 1996 in English and held by 1 WorldCat member library worldwide

Richard, a janitor at a theater, dreams of bringing the role of Richard III to life. When a feud between the play's director and star makes a fool out of Richard, he gets "mad" in more ways than one
A new system to evaluate, monitor and document project costs for the affordable housing program of the Federal Home Loan Bank of Boston by Matthew Franklin( Book )

1 edition published in 1994 in English and held by 1 WorldCat member library worldwide

Address of the American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race : assembled at Philadelphia, in January, 1804 : to the people of the United States by American Convention for Promoting the Abolition of Slavery and Improving the Condition of the African Race( Book )

1 edition published in 1804 in English and held by 1 WorldCat member library worldwide

Financial cryptography by FC '99( )

1 edition published in 1999 in English and held by 1 WorldCat member library worldwide

Communication complexity of secure computation : extended abstract by Matthew Franklin( Book )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Abstract: "A secret-ballot vote for a single proposition is an example of a secure distributed computation. The goal is for n participants to jointly compute the output of some n-ary function (in this case, the sum of the votes), while protecting their individual inputs against some form of misbehavior. In this paper, we initiate the investigation of the communication complexity of unconditionally secure multi-party computation, and its relation with various fault-tolerance models. We present upper and lower bounds on communication, as well as tradeoffs among resources. First, we consider the 'direct sum problem' for communication complexity of perfectly secure protocols: Can the communication complexity of securely computing a single function f: F[superscript n] --> F at k sets of inputs be smaller if all are computed simultaneously than if each is computed individually? We show that the answer depends on the failure model. A factor of O(n/log n) can be gained in the privacy model (where processors are curious but correct); specifically, when f is n-ary addition (mod 2), we show a lower bound of [omega](n²) bits for computing f once and an upper bound of O(n² log n) for computing f O(n) times simultaneously. No gain is possible in a slightly stronger fault model (fail-stop mode); specifically, when f is n-ary addition over GF(q), we show an exact bound of [theta](kn² log q) for computing f at k sets of inputs simultaneously (for any k [> or =] 1). However, if one is willing to pay an additive cost in fault tolerance (from t to t - k + 1), then a variety of known non-cryptographic protocols (including 'provably unparallelizable' protocols from above!) can be systematically compiled to compute one function at k sets of inputs with no increase in communication complexity. Our compilation technique is based on a new compression idea of polynomial-based multi-secret sharing. Lastly, we show how to compile private protocols into error-detecting protocols at a big savings of a factor of O(n³) (up to a log factor) over the best known error-correcting protocols. This is a new notion of fault- tolerant protocols, and is especially useful when malicious behavior is infrequent, since error-detection implies error-correction in this case."
The Lessons Learned in the Application of Augmented Reality( )

1 edition published in 2006 in English and held by 0 WorldCat member libraries worldwide

The purpose of this paper is to provide an overview of the lessons learned from research conducted on behalf of the UK MoD into the application of Augmented Reality (AR) technologies. The lessons learned include technological and procedural aspects discovered during the preliminary research, user field trials and subsequent feedback. The paper is primarily focused on the application of AR in the training domain and in particular the use of AR to support Forward Air Controller training. However, the lessons learned also apply to the use of AR in operational and test and evaluation domains
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.45 (from 0.18 for Classical ... to 1.00 for The Lesson ...)

Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings
Alternative Names
Franklin Matt

Franklin, Matthew

Franklin, Matthew K.

Matt Franklin US-amerikanischer Kryptograph und Informatiker

Matthew K. Franklin Amerikaans wiskundige

Matthew K. Franklin informaticien américain

متیو کی. فرانکلین ریاضی‌دان و دانشمند علوم کامپیوتر آمریکایی

Languages
English (37)

Covers
Advances in cryptology, CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004 : proceedingsFinancial cryptography