TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 76.

Günther, Felix and Manulis, Mark and Peter, Andreas
Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis (eds.) :

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS (8813). Springer
[Conference or Workshop Item] , (2014)

Günther, Felix and Manulis, Mark and Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[Conference or Workshop Item] , (2014)

Stelle, Stanislaus and Manulis, Mark and Hollick, Matthias :
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012) IEEE Computer Society
[Conference or Workshop Item] , (2012)

González Nieto, J. M. and Sun, Dongdong and Manulis, Mark :
Fully Private Revocable Predicate Encryption.
17th Australasian Conference on Information Security and Privacy (ACISP 2012)
[Conference or Workshop Item] , (2012)

Fujioka, Atsushi and Suzuki, Koutarou and Manulis, Mark and Ustaoglu, Berkant :
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
17th Australasian Conference on Information Security and Privacy (ACISP 2012)
[Conference or Workshop Item] , (2012)

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) :
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.), Springer
[Conference or Workshop Item] , (2012)

Fan, C.-I. and Manulis, Mark :
Group Signature with Constant Revocation Costs for Signers and Verifiers.
10th International Conference on Cryptology and Network Security (CANS 2011)
[Conference or Workshop Item] , (2011)

Fischlin, Marc and Libert, B. and Manulis, Mark :
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
ASIACRYPT 2011
[Conference or Workshop Item] , (2011)

Günther, Felix and Manulis, Mark and Strufe, Thorsten :
Cryptographic Treatment of Private User Profiles.
15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS
[Conference or Workshop Item] , (2011)

Günther, Felix and Manulis, Mark and Strufe, Thorsten :
Key Management in Distributed Online Social Networks.
Proceedings of WoWMoM/DSPAN
[Conference or Workshop Item] , (2011)

Christin, Delphine and Hollick, Matthias and Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
19th International Conference on Computer Communications and Networks (ICCCN 2010)
[Conference or Workshop Item] , (2010)

Christin, Delphine and Hollick, Matthias and Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010)
[Conference or Workshop Item] , (2010)

Manulis, Mark and Poettering, Bertram and Tsudik, Gene :
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Manulis, Mark and Poettering, Bertram and Tsudik, Gene :
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Manulis, Mark and Pinkas, Benny and Poettering, Bertram :
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique :
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Conference or Workshop Item] , (2010)

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Conference or Workshop Item] , (2010)

Abdalla, Michel and Chevalier, Celine and Manulis, Mark and Pointcheval, David :
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique :
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique :
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Conference or Workshop Item] , (2010)

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Article] , (2010)

Manulis, Mark and Sadeghi, Ahmad-Reza :
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1) pp. 17-30.
[Article] , (2010)

Manulis, Mark :
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
8th IEEE International Conference on Pervasive Computing and Communications (PerCom 2010), MP2P Workshop IEEE CS
[Conference or Workshop Item] , (2010)

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5) pp. 289-294.
[Article] , (2010)

Cutillo, Leucio-Antonio and Manulis, Mark and Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: UNSPECIFIED Springer
[Book Section] , (2010)

Leroy, Damien and Manulis, Mark and Bonaventure, Olivier :
Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels.
5th ACM Conference on Emerging Network Experiment and Technology (CoNEXT 2009) ACM
[Conference or Workshop Item] , (2009)

Gorantla, Choudary and Boyd, Colin and Nieto, Juan Manuel González and Manulis, Mark :
Generic One Round Group Key Exchange in the Standard Model.
In: LNCS . Springer
[Conference or Workshop Item] , (2009)

Manulis, Mark and Suzuki, Koutarou and Ustaoglu, Berkant :
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
In: LNCS . Springer
[Conference or Workshop Item] , (2009)

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
USENIX LISA 2009 USENIX
[Conference or Workshop Item] , (2009)

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Conference or Workshop Item] , (2009)

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg :
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4) pp. 290-308.
[Article] , (2009)

Manulis, Mark :
Securing Remote Access Inside Wireless Mesh Networks.
10th International Workshop on Information Security Applications (WISA 2009) Springer-Verlag
[Conference or Workshop Item] , (2009)

Manulis, Mark and Leroy, Damien and Koeune, Francois and Bonaventure, Olivier and Quisquater, Jean-Jacques :
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
In ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
[Conference or Workshop Item] , (2009)

Manulis, Mark and Schwenk, Jörg :
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2) Article 13.
[Article] , (2009)

Brecher, Timo and Bresson, Emmanuel and Manulis, Mark :
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
In: LNCS . Springer
[Conference or Workshop Item] , (2009)

Manulis, Mark :
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
In: LNCS . Springer-Verlag
[Conference or Workshop Item] , (2009)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier :
Universally Composable Security Analysis of TLS.
Second Conference on Provable Security (ProvSec)
[Conference or Workshop Item] , (2008)

Bresson, Emmanuel and Manulis, Mark :
Contributory Group Key Exchange in the Presence of Malicious Participants.
In: IET Information Security, 2 (3) pp. 85-93.
[Article] , (2008)

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark :
Property-Based Attestation without a Trusted Third Party.
Information Security Conference (ISC'08)
[Conference or Workshop Item] , (2008)

Bresson, Emmanuel and Manulis, Mark :
Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
In: International Journal of Applied Cryptography, 1 (2) pp. 91-107.
[Article] , (2008)

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Löhr, Hans and Manulis, Mark and Escalante, Alberto :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
4th Information Security Practice and Experience Conference (ISPEC 2008)
[Conference or Workshop Item] , (2008)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Conference or Workshop Item] , (2008)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg :
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science , 5283 . Springer
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg :
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science , 5107 . Springer
[Conference or Workshop Item] , (2008)

Liao, Lijun and Manulis, Mark and Schwenk, Jörg
Gupta, Jatinder N. D. and Sharma, Sushil (eds.) :

Handbook of Research on Information Security and Assurance.
In: UNSPECIFIED IGI Global , 202--217.
[Book Section] , (2008)

Chen, Liqun and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Lecture Notes in Computer Science , 4886 . Springer-Verlag
[Conference or Workshop Item] , (2008)

Chen, Liqun and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza :
Property-Based Attestation without a Trusted Third Party.
In: Lecture Notes in Computer Science , 5222 . Springer
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) ACM Press
[Conference or Workshop Item] , (2008)

Armknecht, Frederik and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science , 4991 . Springer
[Conference or Workshop Item] , (2008)

Bresson, Emmanuel and Manulis, Mark :
Securing Group Key Exchange against Strong Corruptions.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) ACM Press
[Conference or Workshop Item] , (2008)

Manulis, Mark :
Survey on Security Requirements and Models for Group Key Exchange.

[Report] , (2008)

Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science , 5324 . Springer
[Conference or Workshop Item] , (2008)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Browser Models for Usable Authentication Protocols.
IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07)
[Conference or Workshop Item] , (2007)

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Conference or Workshop Item] , (2007)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007)
[Conference or Workshop Item] , (2007)

Bresson, Emmanuel and Manulis, Mark :
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
In: Lecture Notes in Computer Science , 4610 . Springer-Verlag
[Conference or Workshop Item] , (2007)

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark and Escalante, Alberto :
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: LNCS , 4886 . Springer Verlag
[Conference or Workshop Item] , (2007)

Manulis, Mark and Schwenk, Jörg :
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science , 4705 . Springer-Verlag
[Conference or Workshop Item] , (2007)

Manulis, Mark:
Provably Secure Group Key Exchange.
IT Security, 5. Europäischer Universitätsverlag ISBN 978-3-89966-275-7
[Book] , (2007)

Liao, Lijun and Manulis, Mark :
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Future Generation Computer Systems (FGCS), 23 (6) 787--803.
[Article] , (2007)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Manulis, Mark :
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference (ISPEC 2006)
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Manulis, Mark :
Property-based Taming Lying Mobile Node.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Manulis, Mark :
Property-based Taming Lying Mobile Nodes.
International Workshop on Trusted and Autonomic Computing Systems (TACS 2006)
[Conference or Workshop Item] , (2006)

Manulis, Mark :
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'06) ACM Press
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Manulis, Mark :
Key Agreement for Heterogeneous Ad-Hoc Groups.
International Journal of Wireless and Mobile Computing (IJWMC)
[Conference or Workshop Item] , (2006)

Manulis, Mark and Sadeghi, Ahmad-Reza :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
In: Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Manulis, Mark :
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing)
[Conference or Workshop Item] , (2006)

Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science , 3903 . Springer-Verlag
[Conference or Workshop Item] , (2006)

Manulis, Mark and Sadeghi, Ahmad-Reza :
Property-Based Taming of Lying Mobile Nodes.
Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) IEEE Computer Society
[Conference or Workshop Item] , (2006)

Manulis, Mark :
Security-Focused Survey on Group Key Exchange Protocols.

[Report] , (2006)

Liao, Lijun and Manulis, Mark :
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006) Volume 2 Second International Workshop on Security in Networks and Distributed Systems (SNDS 2006) IEEE Computer Society
[Conference or Workshop Item] , (2006)

Manulis, Mark :
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups.
Proceedings of 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005) IEEE Computer Society
[Conference or Workshop Item] , (2005)

Manulis, Mark :
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) Volume 2 International Workshop on Security in Networks and Distributed Systems (SNDS 2005) IEEE Computer Society
[Conference or Workshop Item] , (2005)

Manulis, Mark and Schwenk, Jörg :
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science , 3313 . Springer
[Conference or Workshop Item] , (2004)

This list was generated on Tue Apr 23 01:01:53 2019 CEST.