TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: 2014 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004
Number of items: 76.

2014

Günther, Felix and Manulis, Mark and Peter, Andreas
Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: Cryptology and Network Security (13th International Conference, CANS 2014), Springer, Heraklion, Crete, Greece, In: LNCS, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

2012

Stelle, Stanislaus and Manulis, Mark and Hollick, Matthias (2012):
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In: In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012), IEEE Computer Society, Prague, Czech Republic, [Conference or Workshop Item]

González Nieto, J. M. and Sun, Dongdong and Manulis, Mark (2012):
Fully Private Revocable Predicate Encryption.
In: 17th Australasian Conference on Information Security and Privacy (ACISP 2012), [Conference or Workshop Item]

Fujioka, Atsushi and Suzuki, Koutarou and Manulis, Mark and Ustaoglu, Berkant (2012):
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
In: 17th Australasian Conference on Information Security and Privacy (ACISP 2012), [Conference or Workshop Item]

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

2011

Fan, C.-I. and Manulis, Mark (2011):
Group Signature with Constant Revocation Costs for Signers and Verifiers.
In: 10th International Conference on Cryptology and Network Security (CANS 2011), [Conference or Workshop Item]

Fischlin, Marc and Libert, B. and Manulis, Mark (2011):
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
In: ASIACRYPT 2011, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN, [Conference or Workshop Item]

2010

Christin, Delphine and Hollick, Matthias and Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
In: 19th International Conference on Computer Communications and Networks (ICCCN 2010), [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias and Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010), [Conference or Workshop Item]

Manulis, Mark and Poettering, Bertram and Tsudik, Gene (2010):
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
In: 10th Privacy Enhancing Technologies Symposium (PETS 2010), Springer, In: LNCS, [Conference or Workshop Item]

Manulis, Mark and Poettering, Bertram and Tsudik, Gene (2010):
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
In: 8th International Confrence on Applied Cryptography and Network Security (ACNS 2010), Springer, In: LNCS, [Conference or Workshop Item]

Manulis, Mark and Pinkas, Benny and Poettering, Bertram (2010):
Privacy-Preserving Group Discovery with Linear Complexity.
In: 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Springer, In: LNCS, [Conference or Workshop Item]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Africacrypt 2010, Springer, In: Lecture Notes in Computer Science, 6055, [Conference or Workshop Item]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Springer, In: LNCS, [Conference or Workshop Item]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Public-Key Cryptography (PKC), Springer-Verlag, In: Lecture Notes in Computer Science, 6056, [Conference or Workshop Item]

Abdalla, Michel and Chevalier, Celine and Manulis, Mark and Pointcheval, David (2010):
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: Progress in Cryptology - AFRICACRYPT 2010, Springer, In: LNCS, [Conference or Workshop Item]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: Progress in Cryptology - AFRICACRYPT 2010, Springer, In: LNCS, [Conference or Workshop Item]

Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique (2010):
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Applied Cryptography and Network Security (ACNS) 2010, Springer, In: Lecture Notes in Computer Science, 6055, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-298, 5, [Article]

Manulis, Mark and Sadeghi, Ahmad-Reza (2010):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), pp. 17-30, 4, (1), [Article]

Manulis, Mark (2010):
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
In: 8th IEEE International Conference on Pervasive Computing and Communications (PerCom 2010), MP2P Workshop, IEEE CS, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-294, 34, (5), [Article]

Cutillo, Leucio-Antonio and Manulis, Mark and Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

2009

Leroy, Damien and Manulis, Mark and Bonaventure, Olivier (2009):
Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels.
In: 5th ACM Conference on Emerging Network Experiment and Technology (CoNEXT 2009), ACM, [Conference or Workshop Item]

Gorantla, Choudary and Boyd, Colin and Nieto, Juan Manuel González and Manulis, Mark (2009):
Generic One Round Group Key Exchange in the Standard Model.
In: 12th International Conference on Information Security and Cryptology (ICISC 2009), Springer, In: LNCS, [Conference or Workshop Item]

Manulis, Mark and Suzuki, Koutarou and Ustaoglu, Berkant (2009):
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
In: 12th International Conference on Information Security and Cryptology (ICISC 2009), Springer, In: LNCS, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009, USENIX, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg (2009):
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, pp. 290-308, 1, (4), [Article]

Manulis, Mark (2009):
Securing Remote Access Inside Wireless Mesh Networks.
In: 10th International Workshop on Information Security Applications (WISA 2009), Springer-Verlag, [Conference or Workshop Item]

Manulis, Mark and Leroy, Damien and Koeune, Francois and Bonaventure, Olivier and Quisquater, Jean-Jacques (2009):
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
In: In ACM Symposium on Information, Computer and Communications Security (ASIACCS'09), [Conference or Workshop Item]

Manulis, Mark and Schwenk, Jörg (2009):
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, pp. Article 13, 5, (2), DOI: http://doi.acm.org/10.1145/1498915.1498919,
[Article]

Brecher, Timo and Bresson, Emmanuel and Manulis, Mark (2009):
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
In: 8th International Conference on Cryptology and Network Security (CANS 2009), Springer, In: LNCS, [Conference or Workshop Item]

Manulis, Mark (2009):
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
In: International Conference on Applied Cryptography and Network Security (ACNS 2009), Springer-Verlag, In: LNCS, [Conference or Workshop Item]

2008

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec), [Conference or Workshop Item]

Bresson, Emmanuel and Manulis, Mark (2008):
Contributory Group Key Exchange in the Presence of Malicious Participants.
In: IET Information Security, pp. 85-93, 2, (3), [Article]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08), [Conference or Workshop Item]

Bresson, Emmanuel and Manulis, Mark (2008):
Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
In: International Journal of Applied Cryptography, pp. 91-107, 1, (2), [Article]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Löhr, Hans and Manulis, Mark and Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg (2008):
A Browser-Based Kerberos Authentication Scheme.
In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS 2008), Springer, In: Lecture Notes in Computer Science, 5283, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg (2008):
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Proceedings of 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Springer, In: Lecture Notes in Computer Science, 5107, [Conference or Workshop Item]

Liao, Lijun and Manulis, Mark and Schwenk, Jörg
Gupta, Jatinder N. D. and Sharma, Sushil (eds.) (2008):
Handbook of Research on Information Security and Assurance.
IGI Global, pp. 202--217, [Book Section]

Chen, Liqun and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, Springer-Verlag, In: Lecture Notes in Computer Science, 4886, [Conference or Workshop Item]

Chen, Liqun and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security, 11th International Conference, ISC 2008, Springer, In: Lecture Notes in Computer Science, 5222, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, [Conference or Workshop Item]

Armknecht, Frederik and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Springer, In: Lecture Notes in Computer Science, 4991, [Conference or Workshop Item]

Bresson, Emmanuel and Manulis, Mark (2008):
Securing Group Key Exchange against Strong Corruptions.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, [Conference or Workshop Item]

Manulis, Mark (2008):
Survey on Security Requirements and Models for Group Key Exchange.
(2006/02), [Report]

Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), Springer, In: Lecture Notes in Computer Science, 5324, [Conference or Workshop Item]

2007

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum, Germany, [Conference or Workshop Item]

Bresson, Emmanuel and Manulis, Mark (2007):
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
In: Proceedings of the 4th Autonomic and Trusted Computing Conference (ATC 2007), Springer-Verlag, In: Lecture Notes in Computer Science, 4610, ISBN 3-540-73546-5,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark and Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), Springer Verlag, Scarborough, Trinidad and Tobago, In: LNCS, 4886, [Conference or Workshop Item]

Manulis, Mark and Schwenk, Jörg (2007):
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007, Part I, Springer-Verlag, In: Lecture Notes in Computer Science, 4705, ISBN 3-540-74468-9,
[Conference or Workshop Item]

Manulis, Mark
Paar, Christof and Sadeghi, Ahmad-Reza and Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
Europäischer Universitätsverlag, In: IT Security, 5, ISBN 978-3-89966-275-7,
[Book]

Liao, Lijun and Manulis, Mark (2007):
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Future Generation Computer Systems (FGCS), pp. 787--803, 23, (6), [Article]

2006

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), Vienna, Austria, [Conference or Workshop Item]

Manulis, Mark (2006):
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), ACM Press, ISBN 1-59593-272-0,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC), [Conference or Workshop Item]

Manulis, Mark and Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), Springer-Verlag, In: Lecture Notes in Computer Science, 3903, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Manulis, Mark and Sadeghi, Ahmad-Reza (2006):
Property-Based Taming of Lying Mobile Nodes.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), IEEE Computer Society, [Conference or Workshop Item]

Manulis, Mark (2006):
Security-Focused Survey on Group Key Exchange Protocols.
(2006/03), [Report]

Liao, Lijun and Manulis, Mark (2006):
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 Second International Workshop on Security in Networks and Distributed Systems (SNDS 2006), IEEE Computer Society, [Conference or Workshop Item]

2005

Manulis, Mark (2005):
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups.
In: Proceedings of 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), IEEE Computer Society, ISBN 0-7803-9465-8,
[Conference or Workshop Item]

Manulis, Mark (2005):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) Volume 2 International Workshop on Security in Networks and Distributed Systems (SNDS 2005), IEEE Computer Society, [Conference or Workshop Item]

2004

Manulis, Mark and Schwenk, Jörg (2004):
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: ESAS, Springer, In: Lecture Notes in Computer Science, 3313, [Conference or Workshop Item]

This list was generated on Sat Jul 20 00:57:23 2019 CEST.