TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 76.

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) :

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS (8813). Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag] , (2014)

Stelle, Stanislaus ; Manulis, Mark ; Hollick, Matthias :
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2012)

González Nieto, J. M. ; Sun, Dongdong ; Manulis, Mark :
Fully Private Revocable Predicate Encryption.
17th Australasian Conference on Information Security and Privacy (ACISP 2012)
[Konferenz- oder Workshop-Beitrag] , (2012)

Fujioka, Atsushi ; Suzuki, Koutarou ; Manulis, Mark ; Ustaoglu, Berkant :
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
17th Australasian Conference on Information Security and Privacy (ACISP 2012)
[Konferenz- oder Workshop-Beitrag] , (2012)

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.) :
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.), Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Fan, C.-I. ; Manulis, Mark :
Group Signature with Constant Revocation Costs for Signers and Verifiers.
10th International Conference on Cryptology and Network Security (CANS 2011)
[Konferenz- oder Workshop-Beitrag] , (2011)

Fischlin, Marc ; Libert, B. ; Manulis, Mark :
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
ASIACRYPT 2011
[Konferenz- oder Workshop-Beitrag] , (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Cryptographic Treatment of Private User Profiles.
15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS
[Konferenz- oder Workshop-Beitrag] , (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Key Management in Distributed Online Social Networks.
Proceedings of WoWMoM/DSPAN
[Konferenz- oder Workshop-Beitrag] , (2011)

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
19th International Conference on Computer Communications and Networks (ICCCN 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene :
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene :
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram :
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David :
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique :
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Artikel] , (2010)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1) pp. 17-30.
[Artikel] , (2010)

Manulis, Mark :
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
8th IEEE International Conference on Pervasive Computing and Communications (PerCom 2010), MP2P Workshop IEEE CS
[Konferenz- oder Workshop-Beitrag] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5) pp. 289-294.
[Artikel] , (2010)

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: Keine Angabe Springer
[Buchkapitel] , (2010)

Leroy, Damien ; Manulis, Mark ; Bonaventure, Olivier :
Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels.
5th ACM Conference on Emerging Network Experiment and Technology (CoNEXT 2009) ACM
[Konferenz- oder Workshop-Beitrag] , (2009)

Gorantla, Choudary ; Boyd, Colin ; Nieto, Juan Manuel González ; Manulis, Mark :
Generic One Round Group Key Exchange in the Standard Model.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Manulis, Mark ; Suzuki, Koutarou ; Ustaoglu, Berkant :
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
USENIX LISA 2009 USENIX
[Konferenz- oder Workshop-Beitrag] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Konferenz- oder Workshop-Beitrag] , (2009)

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg :
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4) pp. 290-308.
[Artikel] , (2009)

Manulis, Mark :
Securing Remote Access Inside Wireless Mesh Networks.
10th International Workshop on Information Security Applications (WISA 2009) Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2009)

Manulis, Mark ; Leroy, Damien ; Koeune, Francois ; Bonaventure, Olivier ; Quisquater, Jean-Jacques :
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
In ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
[Konferenz- oder Workshop-Beitrag] , (2009)

Manulis, Mark ; Schwenk, Jörg :
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2) Article 13.
[Artikel] , (2009)

Brecher, Timo ; Bresson, Emmanuel ; Manulis, Mark :
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Manulis, Mark :
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
In: LNCS . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2009)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier :
Universally Composable Security Analysis of TLS.
Second Conference on Provable Security (ProvSec)
[Konferenz- oder Workshop-Beitrag] , (2008)

Bresson, Emmanuel ; Manulis, Mark :
Contributory Group Key Exchange in the Presence of Malicious Participants.
In: IET Information Security, 2 (3) pp. 85-93.
[Artikel] , (2008)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark :
Property-Based Attestation without a Trusted Third Party.
Information Security Conference (ISC'08)
[Konferenz- oder Workshop-Beitrag] , (2008)

Bresson, Emmanuel ; Manulis, Mark :
Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
In: International Journal of Applied Cryptography, 1 (2) pp. 91-107.
[Artikel] , (2008)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
4th Information Security Practice and Experience Conference (ISPEC 2008)
[Konferenz- oder Workshop-Beitrag] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Konferenz- oder Workshop-Beitrag] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
[Konferenz- oder Workshop-Beitrag] , (2008)

Gajek, Sebastian ; Jager, Tibor ; Manulis, Mark ; Schwenk, Jörg :
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science , 5283 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg :
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science , 5107 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Liao, Lijun ; Manulis, Mark ; Schwenk, Jörg
Gupta, Jatinder N. D. ; Sharma, Sushil (eds.) :

Handbook of Research on Information Security and Assurance.
In: Keine Angabe IGI Global , 202--217.
[Buchkapitel] , (2008)

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Lecture Notes in Computer Science , 4886 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2008)

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
Property-Based Attestation without a Trusted Third Party.
In: Lecture Notes in Computer Science , 5222 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2008)

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science , 4991 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Bresson, Emmanuel ; Manulis, Mark :
Securing Group Key Exchange against Strong Corruptions.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2008)

Manulis, Mark :
Survey on Security Requirements and Models for Group Key Exchange.

[Report] , (2008)

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science , 5324 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser Models for Usable Authentication Protocols.
IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07)
[Konferenz- oder Workshop-Beitrag] , (2007)

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Konferenz- oder Workshop-Beitrag] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark :
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007)
[Konferenz- oder Workshop-Beitrag] , (2007)

Bresson, Emmanuel ; Manulis, Mark :
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
In: Lecture Notes in Computer Science , 4610 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS , 4886 . Springer Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Manulis, Mark ; Schwenk, Jörg :
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science , 4705 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Manulis, Mark:
Provably Secure Group Key Exchange.
IT Security, 5. Europäischer Universitätsverlag ISBN 978-3-89966-275-7
[Buch] , (2007)

Liao, Lijun ; Manulis, Mark :
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Future Generation Computer Systems (FGCS), 23 (6) 787--803.
[Artikel] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark :
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference (ISPEC 2006)
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Node.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Property-based Taming Lying Mobile Nodes.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark :
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'06) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogeneous Ad-Hoc Groups.
International Journal of Wireless and Mobile Computing (IJWMC)
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Manulis, Mark :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing)
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg :
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science , 3903 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark ; Sadeghi, Ahmad-Reza :
Property-Based Taming of Lying Mobile Nodes.
Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark :
Security-Focused Survey on Group Key Exchange Protocols.

[Report] , (2006)

Liao, Lijun ; Manulis, Mark :
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 Second International Workshop on Security in Networks and Distributed Systems (SNDS 2006) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2006)

Manulis, Mark :
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups.
Proceedings of 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2005)

Manulis, Mark :
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) Volume 2 International Workshop on Security in Networks and Distributed Systems (SNDS 2005) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2005)

Manulis, Mark ; Schwenk, Jörg :
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science , 3313 . Springer
[Konferenz- oder Workshop-Beitrag] , (2004)

Diese Liste wurde am Tue Dec 18 04:12:57 2018 CET generiert.