TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 76.

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), pp. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Stelle, Stanislaus ; Manulis, Mark ; Hollick, Matthias (2012):
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In: In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012), pp. 28-37,
IEEE Computer Society, Prague, Czech Republic, [Conference or Workshop Item]

González Nieto, J. M. ; Sun, Dongdong ; Manulis, Mark (2012):
Fully Private Revocable Predicate Encryption.
In: 17th Australasian Conference on Information Security and Privacy (ACISP 2012),
[Conference or Workshop Item]

Fujioka, Atsushi ; Suzuki, Koutarou ; Manulis, Mark ; Ustaoglu, Berkant (2012):
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
In: 17th Australasian Conference on Information Security and Privacy (ACISP 2012),
[Conference or Workshop Item]

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

Fan, C.-I. ; Manulis, Mark (2011):
Group Signature with Constant Revocation Costs for Signers and Verifiers.
In: 10th International Conference on Cryptology and Network Security (CANS 2011),
[Conference or Workshop Item]

Fischlin, Marc ; Libert, B. ; Manulis, Mark (2011):
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
In: ASIACRYPT 2011,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN,
[Conference or Workshop Item]

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
In: 19th International Conference on Computer Communications and Networks (ICCCN 2010),
[Conference or Workshop Item]

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010),
[Conference or Workshop Item]

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010):
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
In: LNCS, In: 10th Privacy Enhancing Technologies Symposium (PETS 2010),
Springer, [Conference or Workshop Item]

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010):
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
In: LNCS, In: 8th International Confrence on Applied Cryptography and Network Security (ACNS 2010),
Springer, [Conference or Workshop Item]

Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram (2010):
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS, In: 8th International Conference on Applied Cryptography and Network Security (ACNS 2010),
Springer, [Conference or Workshop Item]

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science, 6055, In: Africacrypt 2010, pp. 333-350,
Springer, [Conference or Workshop Item]

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: LNCS, In: 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010),
Springer, [Conference or Workshop Item]

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), pp. 462-279,
Springer-Verlag, [Conference or Workshop Item]

Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010):
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2010,
Springer, [Conference or Workshop Item]

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010):
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2010,
Springer, [Conference or Workshop Item]

Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique (2010):
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science, 6055, In: Applied Cryptography and Network Security (ACNS) 2010, pp. 333-350,
Springer, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2010):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1), pp. 17-30. [Article]

Manulis, Mark (2010):
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
In: 8th IEEE International Conference on Pervasive Computing and Communications (PerCom 2010), MP2P Workshop,
IEEE CS, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294. [Article]

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Leroy, Damien ; Manulis, Mark ; Bonaventure, Olivier (2009):
Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels.
In: 5th ACM Conference on Emerging Network Experiment and Technology (CoNEXT 2009),
ACM, [Conference or Workshop Item]

Gorantla, Choudary ; Boyd, Colin ; Nieto, Juan Manuel González ; Manulis, Mark (2009):
Generic One Round Group Key Exchange in the Standard Model.
In: LNCS, In: 12th International Conference on Information Security and Cryptology (ICISC 2009),
Springer, [Conference or Workshop Item]

Manulis, Mark ; Suzuki, Koutarou ; Ustaoglu, Berkant (2009):
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
In: LNCS, In: 12th International Conference on Information Security and Cryptology (ICISC 2009),
Springer, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009,
USENIX, [Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2009):
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4), pp. 290-308. [Article]

Manulis, Mark (2009):
Securing Remote Access Inside Wireless Mesh Networks.
In: 10th International Workshop on Information Security Applications (WISA 2009), pp. LNCS,
Springer-Verlag, [Conference or Workshop Item]

Manulis, Mark ; Leroy, Damien ; Koeune, Francois ; Bonaventure, Olivier ; Quisquater, Jean-Jacques (2009):
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
In: In ACM Symposium on Information, Computer and Communications Security (ASIACCS'09), pp. 92-103,
[Conference or Workshop Item]

Manulis, Mark ; Schwenk, Jörg (2009):
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2), pp. Article 13. DOI: http://doi.acm.org/10.1145/1498915.1498919,
[Article]

Brecher, Timo ; Bresson, Emmanuel ; Manulis, Mark (2009):
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
In: LNCS, In: 8th International Conference on Cryptology and Network Security (CANS 2009),
Springer, [Conference or Workshop Item]

Manulis, Mark (2009):
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
In: LNCS, In: International Conference on Applied Cryptography and Network Security (ACNS 2009),
Springer-Verlag, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec),
[Conference or Workshop Item]

Bresson, Emmanuel ; Manulis, Mark (2008):
Contributory Group Key Exchange in the Presence of Malicious Participants.
In: IET Information Security, 2 (3), pp. 85-93. [Article]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08),
[Conference or Workshop Item]

Bresson, Emmanuel ; Manulis, Mark (2008):
Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
In: International Journal of Applied Cryptography, 1 (2), pp. 91-107. [Article]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008),
Sydney, Australia, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08),
[Conference or Workshop Item]

Gajek, Sebastian ; Jager, Tibor ; Manulis, Mark ; Schwenk, Jörg (2008):
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science, 5283, In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS 2008), pp. 115--129,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2008):
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science, 5107, In: Proceedings of 13th Australasian Conference on Information Security and Privacy (ACISP 2008), pp. 6-20,
Springer, [Conference or Workshop Item]

Liao, Lijun ; Manulis, Mark ; Schwenk, Jörg
Gupta, Jatinder N. D. ; Sharma, Sushil (eds.) (2008):
Handbook of Research on Information Security and Assurance.
pp. 202--217, IGI Global, [Book Section]

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Lecture Notes in Computer Science, 4886, In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, pp. 29--44,
Springer-Verlag, [Conference or Workshop Item]

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Property-Based Attestation without a Trusted Third Party.
In: Lecture Notes in Computer Science, 5222, In: Information Security, 11th International Conference, ISC 2008, pp. 31--46,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), pp. 300--311,
ACM Press, [Conference or Workshop Item]

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science, 4991, In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, pp. 29--44,
Springer, [Conference or Workshop Item]

Bresson, Emmanuel ; Manulis, Mark (2008):
Securing Group Key Exchange against Strong Corruptions.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), pp. 249--260,
ACM Press, [Conference or Workshop Item]

Manulis, Mark (2008):
Survey on Security Requirements and Models for Group Key Exchange.
(2006/02), [Report]

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science, 5324, In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), pp. 313--327,
Springer, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07),
Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007),
Bochum, Germany, [Conference or Workshop Item]

Bresson, Emmanuel ; Manulis, Mark (2007):
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
In: Lecture Notes in Computer Science, 4610, In: Proceedings of the 4th Autonomic and Trusted Computing Conference (ATC 2007), pp. 395--409,
Springer-Verlag, ISBN 3-540-73546-5,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS, 4886, In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), pp. 29-44,
Springer Verlag, Scarborough, Trinidad and Tobago, [Conference or Workshop Item]

Manulis, Mark ; Schwenk, Jörg (2007):
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science, 4705, In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007, Part I, pp. 603--621,
Springer-Verlag, ISBN 3-540-74468-9,
[Conference or Workshop Item]

Manulis, Mark
Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
In: IT Security, 5, Europäischer Universitätsverlag, ISBN 978-3-89966-275-7,
[Book]

Liao, Lijun ; Manulis, Mark (2007):
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Future Generation Computer Systems (FGCS), 23 (6), pp. 787--803. [Article]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Hangzhou, China, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Node.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Property-based Taming Lying Mobile Nodes.
In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006),
Vienna, Austria, [Conference or Workshop Item]

Manulis, Mark (2006):
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), p. 365,
ACM Press, ISBN 1-59593-272-0,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogeneous Ad-Hoc Groups.
In: International Journal of Wireless and Mobile Computing (IJWMC),
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing),
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science, 3903, In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), pp. 187--201,
Springer-Verlag, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006):
Property-Based Taming of Lying Mobile Nodes.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), pp. 476--480,
IEEE Computer Society, [Conference or Workshop Item]

Manulis, Mark (2006):
Security-Focused Survey on Group Key Exchange Protocols.
(2006/03), [Report]

Liao, Lijun ; Manulis, Mark (2006):
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 Second International Workshop on Security in Networks and Distributed Systems (SNDS 2006), pp. 5--9,
IEEE Computer Society, [Conference or Workshop Item]

Manulis, Mark (2005):
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups.
In: Proceedings of 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), pp. 811--818,
IEEE Computer Society, ISBN 0-7803-9465-8,
[Conference or Workshop Item]

Manulis, Mark (2005):
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) Volume 2 International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290--294,
IEEE Computer Society, [Conference or Workshop Item]

Manulis, Mark ; Schwenk, Jörg (2004):
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science, 3313, In: ESAS, pp. 107--124,
Springer, [Conference or Workshop Item]

This list was generated on Tue Jul 27 01:42:42 2021 CEST.