TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 76.

Günther, Felix ; Manulis, Mark ; Peter, Andreas
eds.: Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (2014)
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Heraklion, Crete, Greece
Conference or Workshop Item, Bibliographie

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Conference or Workshop Item, Bibliographie

Stelle, Stanislaus ; Manulis, Mark ; Hollick, Matthias (2012)
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Prague, Czech Republic
Conference or Workshop Item, Bibliographie

González Nieto, J. M. ; Sun, Dongdong ; Manulis, Mark (2012)
Fully Private Revocable Predicate Encryption.
Conference or Workshop Item, Bibliographie

Fujioka, Atsushi ; Suzuki, Koutarou ; Manulis, Mark ; Ustaoglu, Berkant (2012)
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Conference or Workshop Item, Bibliographie

eds.: Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (2012)
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
doi: 10.1007/978-3-642-30057-8
Conference or Workshop Item, Bibliographie

Fan, C.-I. ; Manulis, Mark (2011)
Group Signature with Constant Revocation Costs for Signers and Verifiers.
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Libert, B. ; Manulis, Mark (2011)
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
Conference or Workshop Item, Bibliographie

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Cryptographic Treatment of Private User Profiles.
Conference or Workshop Item, Bibliographie

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Key Management in Distributed Online Social Networks.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010)
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010)
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010)
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010)
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram (2010)
Privacy-Preserving Group Discovery with Linear Complexity.
Conference or Workshop Item, Bibliographie

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010)
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Conference or Workshop Item, Bibliographie

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010)
Confidential Signatures and Deterministic Signcryption.
Conference or Workshop Item, Bibliographie

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010)
Confidential Signatures and Deterministic Signcryption.
Conference or Workshop Item, Bibliographie

Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010)
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
3rd International Conference on Cryptology in Africa. Stellenbosch, South Africa (03.-06.05.2010)
doi: 10.1007/978-3-642-12678-9_21
Conference or Workshop Item, Bibliographie

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010)
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique (2010)
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2010)
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
In: Int. J. of Wireless and Mobile Computing (IJWMC), 4 (1)
Article, Bibliographie

Manulis, Mark (2010)
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
Article, Bibliographie

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie

Leroy, Damien ; Manulis, Mark ; Bonaventure, Olivier (2009)
Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels.
Conference or Workshop Item, Bibliographie

Gorantla, Choudary ; Boyd, Colin ; Nieto, Juan Manuel González ; Manulis, Mark (2009)
Generic One Round Group Key Exchange in the Standard Model.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Suzuki, Koutarou ; Ustaoglu, Berkant (2009)
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2009)
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4)
Article, Bibliographie

Manulis, Mark (2009)
Securing Remote Access Inside Wireless Mesh Networks.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Leroy, Damien ; Koeune, Francois ; Bonaventure, Olivier ; Quisquater, Jean-Jacques (2009)
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Schwenk, Jörg (2009)
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2)
doi: 10.1145/1498915.1498919
Article, Bibliographie

Brecher, Timo ; Bresson, Emmanuel ; Manulis, Mark (2009)
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
Conference or Workshop Item, Bibliographie

Manulis, Mark (2009)
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
Conference or Workshop Item, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008)
Universally Composable Security Analysis of TLS.
Conference or Workshop Item, Bibliographie

Bresson, Emmanuel ; Manulis, Mark (2008)
Contributory Group Key Exchange in the Presence of Malicious Participants.
In: IET Information Security, 2 (3)
Article, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark (2008)
Property-Based Attestation without a Trusted Third Party.
Conference or Workshop Item, Bibliographie

Bresson, Emmanuel ; Manulis, Mark (2008)
Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
In: International Journal of Applied Cryptography, 1 (2)
Article, Bibliographie

Sadeghi, Ahmad-Reza ; Armknecht, Frederik ; Löhr, Hans ; Manulis, Mark ; Escalante, Alberto (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Sydney, Australia
Conference or Workshop Item, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
Conference or Workshop Item, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Jager, Tibor ; Manulis, Mark ; Schwenk, Jörg (2008)
A Browser-Based Kerberos Authentication Scheme.
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2008)
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Conference or Workshop Item, Bibliographie

Liao, Lijun ; Manulis, Mark ; Schwenk, Jörg
eds.: Gupta, Jatinder N. D. ; Sharma, Sushil (2008)
Handbook of Research on Information Security and Assurance.
Book Section, Bibliographie

Chen, Liqun ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Conference or Workshop Item, Bibliographie

Chen, Liqun ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Property-Based Attestation without a Trusted Third Party.
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza (2008)
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Conference or Workshop Item, Bibliographie

Bresson, Emmanuel ; Manulis, Mark (2008)
Securing Group Key Exchange against Strong Corruptions.
Conference or Workshop Item, Bibliographie

Manulis, Mark (2008)
Survey on Security Requirements and Models for Group Key Exchange.
Report, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008)
Universally Composable Security Analysis of TLS.
Conference or Workshop Item, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser Models for Usable Authentication Protocols.
Oakland, USA
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007).
Conference or Workshop Item, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007)
Browser-based Authentication Protocols for Naive Users.
Bochum, Germany
Conference or Workshop Item, Bibliographie

Bresson, Emmanuel ; Manulis, Mark (2007)
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Löhr, Hans ; Chen, Liqun ; Manulis, Mark ; Escalante, Alberto (2007)
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
Scarborough, Trinidad and Tobago
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Schwenk, Jörg (2007)
Provably Secure Framework for Information Aggregation in Sensor Networks.
Conference or Workshop Item, Bibliographie

Manulis, Mark
eds.: Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007)
Provably Secure Group Key Exchange.
Book, Bibliographie

Liao, Lijun ; Manulis, Mark (2007)
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
In: Future Generation Computer Systems (FGCS), 23 (6)
Article, Bibliographie

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Linkable Democratic Group Signatures.
Hangzhou, China
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Node.
Vienna, Austria
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Property-based Taming Lying Mobile Nodes.
Vienna, Austria
Conference or Workshop Item, Bibliographie

Manulis, Mark (2006)
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogeneous Ad-Hoc Groups.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing).
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Manulis, Mark (2006)
Key Agreement for Heterogenous Mobile Ad-hoc Groups.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006)
Linkable Democratic Group Signatures.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Sadeghi, Ahmad-Reza (2006)
Property-Based Taming of Lying Mobile Nodes.
Conference or Workshop Item, Bibliographie

Manulis, Mark (2006)
Security-Focused Survey on Group Key Exchange Protocols.
Report, Bibliographie

Liao, Lijun ; Manulis, Mark (2006)
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
Conference or Workshop Item, Bibliographie

Manulis, Mark (2005)
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups.
Conference or Workshop Item, Bibliographie

Manulis, Mark (2005)
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
Conference or Workshop Item, Bibliographie

Manulis, Mark ; Schwenk, Jörg (2004)
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
Conference or Workshop Item, Bibliographie

This list was generated on Tue Apr 23 00:10:15 2024 CEST.