Mark Manulis
Mark Manulis
Head of Department of Computer Science, Reader, University of Surrey
Verified email at surrey.ac.uk - Homepage
Title
Cited by
Cited by
Year
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1272010
Property-based attestation without a trusted third party
L Chen, H Löhr, M Manulis, AR Sadeghi
International Conference on Information Security, 31-46, 2008
1002008
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
International Conference on Provable Security, 313-327, 2008
832008
Tree-based group key agreement framework for mobile ad-hoc networks
L Liao, M Manulis
Future Generation Computer Systems 23 (6), 787-803, 2007
632007
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12 (1), 49-65, 2013
622013
Securing group key exchange against strong corruptions
E Bresson, M Manulis
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
622008
Contributory group key agreement protocols, revisited for mobile ad-hoc groups
M Manulis
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005
462005
Security and privacy in online social networks
LA Cutillo, M Manulis, T Strufe
Handbook of Social Network Technologies and Applications, 497-522, 2010
442010
Non-interactive and re-usable universally composable string commitments with adaptive security
M Fischlin, B Libert, M Manulis
International Conference on the Theory and Application of Cryptology and …, 2011
432011
Democratic group signatures: on an example of joint ventures
M Manulis
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
402006
Security model and framework for information aggregation in sensor networks
M Manulis, J Schwenk
ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009
39*2009
On security models and compilers for group key exchange protocols
E Bresson, M Manulis, J Schwenk
International Workshop on Security, 292-307, 2007
362007
A privacy-protecting multi-coupon scheme with stronger protection against splitting
L Chen, AN Escalante B, H Löhr, M Manulis, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 29-44, 2007
362007
Generic one round group key exchange in the standard model
MC Gorantla, C Boyd, JMG Nieto, M Manulis
International Conference on Information Security and Cryptology, 1-15, 2009
342009
A modular framework for multi-factor authentication and key exchange
N Fleischhacker, M Manulis, A Azodi
International Conference on Research in Security Standardisation, 190-214, 2014
33*2014
Survey on Security Requirements and Models for Group Key Exchange.
M Manulis
IACR Cryptol. ePrint Arch. 2006, 388, 2006
322006
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
International Conference on Cryptology in Africa, 333-350, 2010
312010
Malicious participants in group key exchange: key control and contributiveness in the shadow of trust
E Bresson, M Manulis
International Conference on Autonomic and Trusted Computing, 395-409, 2007
312007
Fully private revocable predicate encryption
JM González-Nieto, M Manulis, D Sun
Australasian Conference on Information Security and Privacy, 350-363, 2012
302012
Modeling leakage of ephemeral secrets in tripartite/group key exchange
M Manulis, K Suzuki, B Ustaoglu
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
292013
The system can't perform the operation now. Try again later.
Articles 1–20