Follow
Mark Manulis
Mark Manulis
Professor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr München
Verified email at unibw.de - Homepage
Title
Cited by
Cited by
Year
Cyber security in new space
M Manulis, CP Bridges, R Harrison, V Sekar, A Davis
International Journal of Information Security 20 (3), 287-311, 2021
1612021
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1462010
Property-based attestation without a trusted third party
L Chen, H Löhr, M Manulis, AR Sadeghi
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
1052008
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008
1012008
Modeling key compromise impersonation attacks on group key exchange protocols
MC Gorantla, C Boyd, JMG Nieto, M Manulis
ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008
872008
Securing group key exchange against strong corruptions
E Bresson, M Manulis
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
752008
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12, 49-65, 2013
672013
Tree-based group key agreement framework for mobile ad-hoc networks
L Liao, M Manulis
Future Generation Computer Systems 23 (6), 787-803, 2007
672007
Security and privacy in online social networks
LA Cutillo, M Manulis, T Strufe
Handbook of social network technologies and applications, 497-522, 2010
602010
Non-interactive and re-usable universally composable string commitments with adaptive security
M Fischlin, B Libert, M Manulis
International Conference on the Theory and Application of Cryptology and …, 2011
512011
A modular framework for multi-factor authentication and key exchange
N Fleischhacker, M Manulis, A Azodi
Security Standardisation Research: First International Conference, SSR 2014 …, 2014
48*2014
Democratic group signatures: on an example of joint ventures
M Manulis
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
482006
Contributory group key agreement protocols, revisited for mobile ad-hoc groups
M Manulis
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005
482005
Security model and framework for information aggregation in sensor networks
M Manulis, J Schwenk
ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009
42*2009
Generic one round group key exchange in the standard model
MC Gorantla, C Boyd, JM González Nieto, M Manulis
Information, Security and Cryptology–ICISC 2009: 12th International …, 2010
402010
On security models and compilers for group key exchange protocols
E Bresson, M Manulis, J Schwenk
Advances in Information and Computer Security: Second International Workshop …, 2007
382007
Group signatures: Authentication with privacy
M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering
Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012
372012
Fully private revocable predicate encryption
JM González-Nieto, M Manulis, D Sun
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
372012
Zero-knowledge password policy checks and verifier-based PAKE
F Kiefer, M Manulis
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
362014
Modeling leakage of ephemeral secrets in tripartite/group key exchange
M Manulis, K Suzuki, B Ustaoglu
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
362013
The system can't perform the operation now. Try again later.
Articles 1–20