default search action
Mark Manulis
Person information
- affiliation: Bundeswehr University Munich, Germany
- affiliation (former): University of Surrey, UK
- affiliation (former): Darmstadt University of Technology, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c81]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. CCS 2024: 4688-4702 - [c80]Mark Manulis, Jérôme Nguyen:
Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability. EUROCRYPT (2) 2024: 63-93 - [c79]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. USENIX Security Symposium 2024 - [e7]Mark Manulis, Diana Maimut, George Teseleanu:
Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14534, Springer 2024, ISBN 978-3-031-52946-7 [contents] - [i45]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. IACR Cryptol. ePrint Arch. 2024: 54 (2024) - [i44]Mark Manulis, Jérôme Nguyen:
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability. IACR Cryptol. ePrint Arch. 2024: 202 (2024) - [i43]Mark Manulis, Hugo Nartz:
Distributed Asynchronous Remote Key Generation. IACR Cryptol. ePrint Arch. 2024: 846 (2024) - [i42]Jia Liu, Mark Manulis:
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility. IACR Cryptol. ePrint Arch. 2024: 968 (2024) - [i41]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. IACR Cryptol. ePrint Arch. 2024: 986 (2024) - 2023
- [c78]Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems. ACNS (1) 2023: 394-421 - [c77]Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. EuroS&P 2023: 928-941 - [e6]Shujun Li, Mark Manulis, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8 [contents] - [i40]Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. IACR Cryptol. ePrint Arch. 2023: 419 (2023) - [i39]Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 456 (2023) - 2022
- [j20]Yifan Yang, Daniel Cooper, John P. Collomosse, Constantin Catalin Dragan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen S. Jones, Wendy Moncur:
TAPESTRY: A De-Centralized Service for Trusted Interaction Online. IEEE Trans. Serv. Comput. 15(3): 1385-1398 (2022) - [c76]Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-Based Signatures from Lattices. ACNS 2022: 459-479 - [c75]M. Caballero, Dimitris Kavallieros, A. Spyros, A. Tavernarakisv, Athanasios Tziouvaras, Stefano Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, Emmanouil Kafetzakis, T. Kasig, Vaios Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, Mark Manulis, Sofia-Anna Menesidou, Sokratis Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, Dimitrios Papamartzivanos, Spyros Papastergiou, K. Sanchez, Christos Sakkas, K. Stelliou, L. Trujillo, Theodora Tsikrika, E. Venegas, Stefanos Vrochidis, D. Xydias:
ICT in Healthcare: the role of IoT and the SECANT solution. CSR 2022: 104-111 - [c74]Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. ESORICS (3) 2022: 125-144 - [i38]Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. IACR Cryptol. ePrint Arch. 2022: 303 (2022) - [i37]Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-based Signatures from Lattices. IACR Cryptol. ePrint Arch. 2022: 397 (2022) - 2021
- [j19]Mark Manulis, Christopher P. Bridges, R. Harrison, Venkkatesh Sekar, Andy Davis:
Cyber security in New Space. Int. J. Inf. Sec. 20(3): 287-311 (2021) - [j18]Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar:
Password-authenticated searchable encryption. Int. J. Inf. Sec. 20(5): 675-693 (2021) - 2020
- [c73]Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. ACNS (2) 2020: 40-61 - [c72]Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. CCS 2020: 939-954 - [c71]Matthew Casey, Mark Manulis, Christopher J. P. Newton, Robin Savage, Helen Treharne:
An Interoperable Architecture for Usable Password-Less Authentication. ETAA@ESORICS 2020: 16-32 - [c70]Constantin Catalin Dragan, Mark Manulis:
KYChain: user-controlled KYC data sharing and certification. SAC 2020: 301-307 - [e5]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i36]Constantin Catalin Dragan, Mark Manulis:
KYChain: User-Controlled KYC Data Sharing and Certification. CoRR abs/2001.01659 (2020) - [i35]Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. IACR Cryptol. ePrint Arch. 2020: 17 (2020) - [i34]Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. IACR Cryptol. ePrint Arch. 2020: 1004 (2020)
2010 – 2019
- 2019
- [c69]Daniel Gardham, Mark Manulis:
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length. ACNS 2019: 89-109 - [c68]Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. ACNS 2019: 550-570 - [c67]Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier López:
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics. ESORICS (2) 2019: 263-280 - [i33]Yifan Yang, Daniel Cooper, John P. Collomosse, Constantin Catalin Dragan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen S. Jones, Wendy Moncur:
TAPESTRY: A Blockchain based Service for Trusted Interaction Online. CoRR abs/1905.06186 (2019) - [i32]Nick Frymann, Mark Manulis:
Securing Fleets of Consumer Drones at Low Cost. CoRR abs/1912.05064 (2019) - [i31]Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. IACR Cryptol. ePrint Arch. 2019: 378 (2019) - [i30]Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length. IACR Cryptol. ePrint Arch. 2019: 382 (2019) - 2018
- [c66]Constantin Catalin Dragan, Daniel Gardham, Mark Manulis:
Hierarchical Attribute-Based Signatures. CANS 2018: 213-234 - [c65]Constantin Catalin Dragan, Mark Manulis:
Bootstrapping Online Trust: Timeline Activity Proofs. DPM/CBT@ESORICS 2018: 242-259 - [e4]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [i29]Constantin Catalin Dragan, Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures. IACR Cryptol. ePrint Arch. 2018: 610 (2018) - 2017
- [c64]Kaibin Huang, Mark Manulis, Liqun Chen:
Password Authenticated Keyword Search. PAC 2017: 129-140 - 2016
- [j17]Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c63]Franziskus Kiefer, Mark Manulis:
Blind Password Registration for Verifier-based PAKE. AsiaPKC@AsiaCCS 2016: 39-48 - [c62]Franziskus Kiefer, Mark Manulis:
Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols. ISC 2016: 95-114 - [c61]Franziskus Kiefer, Mark Manulis:
Universally Composable Two-Server PAKE. ISC 2016: 147-166 - [e3]Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8 [contents] - [i28]Franziskus Kiefer, Mark Manulis:
Blind Password Registration for Verifier-based PAKE. IACR Cryptol. ePrint Arch. 2016: 442 (2016) - [i27]Franziskus Kiefer, Mark Manulis:
Universally Composable Two-Server PAKE. IACR Cryptol. ePrint Arch. 2016: 520 (2016) - 2015
- [c60]Veronika Kuchta, Mark Manulis:
Public Key Encryption with Distributed Keyword Search. INTRUST 2015: 62-83 - [c59]Franziskus Kiefer, Mark Manulis:
Oblivious PAKE: Efficient Handling of Password Trials. ISC 2015: 191-208 - 2014
- [j16]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Comput. J. 57(4): 510-536 (2014) - [j15]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c58]Franziskus Kiefer, Mark Manulis:
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. ACNS 2014: 199-216 - [c57]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c56]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. CANS 2014: 321-336 - [c55]Franziskus Kiefer, Mark Manulis:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. ESORICS (2) 2014: 295-312 - [c54]Veronika Kuchta, Mark Manulis:
Rerandomizable Threshold Blind Signatures. INTRUST 2014: 70-89 - [c53]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [c52]Nils Fleischhacker, Mark Manulis, Amir Azodi:
A Modular Framework for Multi-Factor Authentication and Key Exchange. SSR 2014: 190-214 - [i26]Franziskus Kiefer, Mark Manulis:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. IACR Cryptol. ePrint Arch. 2014: 242 (2014) - [i25]Franziskus Kiefer, Mark Manulis:
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE. IACR Cryptol. ePrint Arch. 2014: 350 (2014) - [i24]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation. IACR Cryptol. ePrint Arch. 2014: 382 (2014) - [i23]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptol. ePrint Arch. 2014: 731 (2014) - 2013
- [j14]Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 101-110 (2013) - [j13]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private discovery of common social contacts. Int. J. Inf. Sec. 12(1): 49-65 (2013) - [j12]Ioannis G. Askoxylakis, Mark Manulis, Joachim Posegga:
Security and privacy for digital ecosystems. Inf. Secur. Tech. Rep. 17(3): 45 (2013) - [j11]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [c51]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". ACISP 2013: 187-202 - [c50]Veronika Kuchta, Mark Manulis:
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. CANS 2013: 251-270 - [c49]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom signatures. AsiaCCS 2013: 107-118 - [i22]Franziskus Kiefer, Mark Manulis:
Oblivious PAKE and Efficient Handling of Password Trials. IACR Cryptol. ePrint Arch. 2013: 127 (2013) - [i21]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". IACR Cryptol. ePrint Arch. 2013: 230 (2013) - 2012
- [c48]Stanislaus Stelle, Mark Manulis, Matthias Hollick:
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. ARES 2012: 28-37 - [c47]Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu:
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. ACISP 2012: 15-28 - [c46]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. ACISP 2012: 350-363 - [c45]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Pairing 2012: 83-101 - [c44]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [e2]Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis:
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings. Springer 2012, ISBN 978-3-642-35403-8 [contents] - [e1]Marc Fischlin, Johannes Buchmann, Mark Manulis:
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7293, Springer 2012, ISBN 978-3-642-30056-1 [contents] - [i20]Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright:
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports 2(9): 165-183 (2012) - [i19]Nils Fleischhacker, Mark Manulis, Amir Azodi:
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2012: 181 (2012) - [i18]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i17]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 402 (2012) - [i16]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 403 (2012) - [i15]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptol. ePrint Arch. 2012: 559 (2012) - 2011
- [j10]Damien Leroy, Gregory Detal, Julien Cathalo, Mark Manulis, François Koeune, Olivier Bonaventure:
SWISH: Secure WiFi sharing. Comput. Networks 55(7): 1614-1630 (2011) - [j9]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Modeling key compromise impersonation attacks on group key exchange protocols. ACM Trans. Inf. Syst. Secur. 14(4): 28:1-28:24 (2011) - [c43]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. ACNS 2011: 147-165 - [c42]Marc Fischlin, Benoît Libert, Mark Manulis:
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. ASIACRYPT 2011: 468-485 - [c41]Chun-I Fan, Ruei-Hau Hsu, Mark Manulis:
Group Signature with Constant Revocation Costs for Signers and Verifiers. CANS 2011: 214-233 - [c40]Mark Manulis, Bertram Poettering:
Practical affiliation-hiding authentication from improved polynomial interpolation. AsiaCCS 2011: 286-295 - [c39]Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. Financial Cryptography Workshops 2011: 40-54 - [c38]Mark Manulis, Marion Steiner:
UPBA: User-Authenticated Property-Based Attestation. PST 2011: 112-119 - [c37]Mark Manulis, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011: 85-99 - [c36]Felix Günther, Mark Manulis, Thorsten Strufe:
Key management in distributed online social networks. WOWMOM 2011: 1-7 - [i14]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. IACR Cryptol. ePrint Arch. 2011: 26 (2011) - [i13]Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. IACR Cryptol. ePrint Arch. 2011: 64 (2011) - [i12]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom Signatures. IACR Cryptol. ePrint Arch. 2011: 673 (2011) - 2010
- [j8]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010) - [j7]Mark Manulis, Ahmad-Reza Sadeghi:
Key agreement for heterogeneous mobile ad-hoc groups. Int. J. Wirel. Mob. Comput. 4(1): 17-30 (2010) - [c35]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c34]Mark Manulis, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010: 402-419 - [c33]Mark Manulis, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010: 420-437 - [c32]David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. AFRICACRYPT 2010: 333-350 - [c31]Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. AFRICACRYPT 2010: 351-368 - [c30]Delphine Christin, Matthias Hollick, Mark Manulis:
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks. ICCCN 2010: 1-6 - [c29]Mark Manulis:
Privacy-preserving admission to mobile peer-to-peer groups. PerCom Workshops 2010: 111-116 - [c28]Mark Manulis, Bertram Poettering, Gene Tsudik:
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Privacy Enhancing Technologies 2010: 149-165 - [c27]Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder:
Confidential Signatures and Deterministic Signcryption. Public Key Cryptography 2010: 462-479 - [p1]Leucio Antonio Cutillo, Mark Manulis, Thorsten Strufe:
Security and Privacy in Online Social Networks. Handbook of Social Network Technologies 2010: 497-522 - [i11]Mark Manulis, Bertram Poettering:
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. IACR Cryptol. ePrint Arch. 2010: 659 (2010)
2000 – 2009
- 2009
- [j6]Sebastian Gajek, Mark Manulis, Jörg Schwenk:
User-aware provably secure protocols for browser-based mutual authentication. Int. J. Appl. Cryptogr. 1(4): 290-308 (2009) - [j5]Mark Manulis, Jörg Schwenk:
Security model and framework for information aggregation in sensor networks. ACM Trans. Sens. Networks 5(2): 13:1-13:28 (2009) - [c26]Mark Manulis:
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. ACNS 2009: 1-19 - [c25]Timo Brecher, Emmanuel Bresson, Mark Manulis:
Fully Robust Tree-Diffie-Hellman Group Key Exchange. CANS 2009: 478-497 - [c24]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - [c23]Damien Leroy, Mark Manulis, Olivier Bonaventure:
Enhanced wireless roaming security using three-party authentication and tunnels. U-NET@CoNEXT 2009: 7-12 - [c22]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. ICISC 2009: 1-15 - [c21]Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. ICISC 2009: 16-33 - [c20]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - [c19]Mark Manulis:
Securing Remote Access Inside Wireless Mesh Networks. WISA 2009: 324-338 - [i10]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 514 (2009) - [i9]Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder:
Confidential Signatures and Deterministic Signcryption. IACR Cryptol. ePrint Arch. 2009: 588 (2009) - 2008
- [j4]Emmanuel Bresson, Mark Manulis:
Contributory group key exchange in the presence of malicious participants. IET Inf. Secur. 2(3): 85-93 (2008) - [j3]Emmanuel Bresson, Mark Manulis:
Securing group key exchange against strong corruptions and key registration attacks. Int. J. Appl. Cryptogr. 1(2): 91-107 (2008) - [j2]Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008) - [c18]Sebastian Gajek, Mark Manulis, Jörg Schwenk:
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. ACISP 2008: 6-20 - [c17]Emmanuel Bresson, Mark Manulis:
Securing group key exchange against strong corruptions. AsiaCCS 2008: 249-260 - [c16]Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS. AsiaCCS 2008: 300-311 - [c15]Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk:
A Browser-Based Kerberos Authentication Scheme. ESORICS 2008: 115-129 - [c14]Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ISPEC 2008: 29-44 - [c13]Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 - [c12]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 - [i8]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptol. ePrint Arch. 2008: 251 (2008) - [i7]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptol. ePrint Arch. 2008: 382 (2008) - 2007
- [b1]Mark Manulis:
Provably secure group key exchange. Ruhr University Bochum, 2007, ISBN 978-3-89966-275-7, pp. 1-222 - [j1]Lijun Liao, Mark Manulis:
Tree-based group key agreement framework for mobile ad-hoc networks. Future Gener. Comput. Syst. 23(6): 787-803 (2007) - [c11]Emmanuel Bresson, Mark Manulis:
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. ATC 2007: 395-409 - [c10]Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 - [c9]Mark Manulis, Jörg Schwenk:
Provably Secure Framework for Information Aggregation in Sensor Networks. ICCSA (1) 2007: 603-621 - [c8]Emmanuel Bresson, Mark Manulis, Jörg Schwenk:
On Security Models and Compilers for Group Key Exchange Protocols. IWSEC 2007: 292-307 - [i6]Mark Manulis, Jörg Schwenk:
Provably Secure Framework for Information Aggregation is Sensor Networks. IACR Cryptol. ePrint Arch. 2007: 283 (2007) - 2006
- [c7]Lijun Liao, Mark Manulis:
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. AINA (2) 2006: 5-9 - [c6]Mark Manulis, Ahmad-Reza Sadeghi:
Property-Based Taming of Lying Mobile Nodes. AINA (2) 2006: 476-480 - [c5]Mark Manulis:
Democratic group signatures: on an example of joint ventures. AsiaCCS 2006: 365 - [c4]Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. ISPEC 2006: 187-201 - [i5]Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. IACR Cryptol. ePrint Arch. 2006: 40 (2006) - [i4]Emmanuel Bresson, Mark Manulis, Jörg Schwenk:
On Security Models and Compilers for Group Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2006: 385 (2006) - [i3]Mark Manulis:
Survey on Security Requirements and Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2006: 388 (2006) - [i2]Mark Manulis:
Security-Focused Survey on Group Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2006: 395 (2006) - 2005
- [c3]Mark Manulis:
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups. ICPADS (2) 2005: 290-294 - [c2]Mark Manulis:
Contributory group key agreement protocols, revisited for mobile ad-hoc groups. MASS 2005 - [i1]Mark Manulis:
Democratic Group Signatures on Example of Joint Ventures. IACR Cryptol. ePrint Arch. 2005: 446 (2005) - 2004
- [c1]Mark Manulis, Jörg Schwenk:
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. ESAS 2004: 107-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint