Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mark Manulis
@proceedings{DBLP:conf/secitc/2023, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-52947-4}, doi = {10.1007/978-3-031-52947-4}, isbn = {978-3-031-52946-7}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MengCTML24, author = {Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu}, title = {{FEASE:} Fast and Expressive Asymmetric Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2024}, url = {https://eprint.iacr.org/2024/054}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MengCTML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisN24, author = {Mark Manulis and J{\'{e}}r{\^{o}}me Nguyen}, title = {Fully Homomorphic Encryption beyond {IND-CCA1} Security: Integrity through Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2024}, url = {https://eprint.iacr.org/2024/202}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ManulisN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrymannGMN23, author = {Nick Frymann and Daniel Gardham and Mark Manulis and Hugo Nartz}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {394--421}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_15}, doi = {10.1007/978-3-031-33488-7\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FrymannGMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/FrymannGM23, author = {Nick Frymann and Daniel Gardham and Mark Manulis}, title = {Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {928--941}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00059}, doi = {10.1109/EUROSP57164.2023.00059}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/FrymannGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2023, editor = {Shujun Li and Mark Manulis and Atsuko Miyaji}, title = {Network and System Security - 17th International Conference, {NSS} 2023, Canterbury, UK, August 14-16, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13983}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39828-5}, doi = {10.1007/978-3-031-39828-5}, isbn = {978-3-031-39827-8}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrymannGM23, author = {Nick Frymann and Daniel Gardham and Mark Manulis}, title = {Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2023}, url = {https://eprint.iacr.org/2023/419}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrymannGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrymannGMN23, author = {Nick Frymann and Daniel Gardham and Mark Manulis and Hugo Nartz}, title = {Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2023}, url = {https://eprint.iacr.org/2023/456}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrymannGMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangCCDMSMBJM22, author = {Yifan Yang and Daniel Cooper and John P. Collomosse and Constantin Catalin Dragan and Mark Manulis and Jamie Steane and Arthi Manohar and Jo Briggs and Helen S. Jones and Wendy Moncur}, title = {{TAPESTRY:} {A} De-Centralized Service for Trusted Interaction Online}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1385--1398}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.2993081}, doi = {10.1109/TSC.2020.2993081}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangCCDMSMBJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GardhamM22, author = {Daniel Gardham and Mark Manulis}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Revocable Hierarchical Attribute-Based Signatures from Lattices}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {459--479}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_23}, doi = {10.1007/978-3-031-09234-3\_23}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/GardhamM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/CaballeroKSTTBC22, author = {M. Caballero and Dimitris Kavallieros and A. Spyros and A. Tavernarakisv and Athanasios Tziouvaras and Stefano Bonacina and K. Chandrarmouli and M. Coroiu and L. Chen and T. Dounia and I. Giannoulakis and N. Gligoric and Emmanouil Kafetzakis and T. Kasig and Vaios Koumaras and T. Krousarlis and K. Lapidaki and A. Markakis and S. Marin and Mark Manulis and Sofia{-}Anna Menesidou and S. Nifakos and L. Meng and S. Mhiri and M. Nati and K. Ntafloukas and D. Oniga and Dimitrios Papamartzivanos and Spyros Papastergiou and K. Sanchez and Christos Sakkas and K. Stelliou and L. Trujillo and Theodora Tsikrika and E. Venegas and Stefanos Vrochidis and D. Xydias}, title = {{ICT} in Healthcare: the role of IoT and the {SECANT} solution}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {104--111}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850319}, doi = {10.1109/CSR54599.2022.9850319}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csr2/CaballeroKSTTBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FrymannGM22, author = {Nick Frymann and Daniel Gardham and Mark Manulis}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Unlinkable Delegation of WebAuthn Credentials}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {125--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_7}, doi = {10.1007/978-3-031-17143-7\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FrymannGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrymannGM22, author = {Nick Frymann and Daniel Gardham and Mark Manulis}, title = {Unlinkable Delegation of WebAuthn Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2022}, url = {https://eprint.iacr.org/2022/303}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FrymannGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GardhamM22, author = {Daniel Gardham and Mark Manulis}, title = {Revocable Hierarchical Attribute-based Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2022}, url = {https://eprint.iacr.org/2022/397}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GardhamM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisBHSD21, author = {Mark Manulis and Christopher P. Bridges and R. Harrison and Venkkatesh Sekar and Andy Davis}, title = {Cyber security in New Space}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {3}, pages = {287--311}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00503-w}, doi = {10.1007/S10207-020-00503-W}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisBHSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenHMS21, author = {Liqun Chen and Kaibin Huang and Mark Manulis and Venkkatesh Sekar}, title = {Password-authenticated searchable encryption}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {5}, pages = {675--693}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00524-5}, doi = {10.1007/S10207-020-00524-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenHMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GardhamMD20, author = {Daniel Gardham and Mark Manulis and Constantin Catalin Dragan}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Biometric-Authenticated Searchable Encryption}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {40--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_3}, doi = {10.1007/978-3-030-57878-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GardhamMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrymannGKLMN20, author = {Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for {W3C} WebAuthn}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {939--954}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417292}, doi = {10.1145/3372297.3417292}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FrymannGKLMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CaseyMNST20, author = {Matthew Casey and Mark Manulis and Christopher J. P. Newton and Robin Savage and Helen Treharne}, editor = {Andrea Saracino and Paolo Mori}, title = {An Interoperable Architecture for Usable Password-Less Authentication}, booktitle = {Emerging Technologies for Authorization and Authentication - Third International Workshop, {ETAA} 2020, Guildford, UK, September 18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12515}, pages = {16--32}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64455-0\_2}, doi = {10.1007/978-3-030-64455-0\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CaseyMNST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DraganM20, author = {Constantin Catalin Dragan and Mark Manulis}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {KYChain: user-controlled {KYC} data sharing and certification}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {301--307}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373895}, doi = {10.1145/3341105.3373895}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DraganM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020detips, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3}, doi = {10.1007/978-3-030-66504-3}, isbn = {978-3-030-66503-6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020detips.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-01659, author = {Constantin Catalin Dragan and Mark Manulis}, title = {KYChain: User-Controlled {KYC} Data Sharing and Certification}, journal = {CoRR}, volume = {abs/2001.01659}, year = {2020}, url = {http://arxiv.org/abs/2001.01659}, eprinttype = {arXiv}, eprint = {2001.01659}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-01659.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GardhamMD20, author = {Daniel Gardham and Mark Manulis and Constantin Catalin Dragan}, title = {Biometric-Authenticated Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2020}, url = {https://eprint.iacr.org/2020/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GardhamMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrymannGKLMN20, author = {Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson}, title = {Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for {W3C} WebAuthn}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2020}, url = {https://eprint.iacr.org/2020/1004}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrymannGKLMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GardhamM19, author = {Daniel Gardham and Mark Manulis}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {89--109}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_5}, doi = {10.1007/978-3-030-21568-2\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GardhamM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuM19, author = {Jia Liu and Mark Manulis}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {pRate: Anonymous Star Rating with Rating Secrecy}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {550--570}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_27}, doi = {10.1007/978-3-030-21568-2\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RubioMAL19, author = {Juan E. Rubio and Mark Manulis and Cristina Alcaraz and Javier L{\'{o}}pez}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {263--280}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_13}, doi = {10.1007/978-3-030-29962-0\_13}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RubioMAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-06186, author = {Yifan Yang and Daniel Cooper and John P. Collomosse and Constantin Catalin Dragan and Mark Manulis and Jamie Steane and Arthi Manohar and Jo Briggs and Helen S. Jones and Wendy Moncur}, title = {{TAPESTRY:} {A} Blockchain based Service for Trusted Interaction Online}, journal = {CoRR}, volume = {abs/1905.06186}, year = {2019}, url = {http://arxiv.org/abs/1905.06186}, eprinttype = {arXiv}, eprint = {1905.06186}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-06186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-05064, author = {Nick Frymann and Mark Manulis}, title = {Securing Fleets of Consumer Drones at Low Cost}, journal = {CoRR}, volume = {abs/1912.05064}, year = {2019}, url = {http://arxiv.org/abs/1912.05064}, eprinttype = {arXiv}, eprint = {1912.05064}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-05064.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuM19, author = {Jia Liu and Mark Manulis}, title = {pRate: Anonymous Star Rating with Rating Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2019}, url = {https://eprint.iacr.org/2019/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GardhamM19, author = {Daniel Gardham and Mark Manulis}, title = {Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2019}, url = {https://eprint.iacr.org/2019/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GardhamM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DraganGM18, author = {Constantin Catalin Dragan and Daniel Gardham and Mark Manulis}, editor = {Jan Camenisch and Panos Papadimitratos}, title = {Hierarchical Attribute-Based Signatures}, booktitle = {Cryptology and Network Security - 17th International Conference, {CANS} 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11124}, pages = {213--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00434-7\_11}, doi = {10.1007/978-3-030-00434-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DraganGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DraganM18, author = {Constantin Catalin Dragan and Mark Manulis}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Giovanni Livraga and Ruben Rios}, title = {Bootstrapping Online Trust: Timeline Activity Proofs}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11025}, pages = {242--259}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00305-0\_18}, doi = {10.1007/978-3-030-00305-0\_18}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DraganM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2018, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8}, doi = {10.1007/978-3-319-99136-8}, isbn = {978-3-319-99135-1}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DraganGM18, author = {Constantin Catalin Dragan and Daniel Gardham and Mark Manulis}, title = {Hierarchical Attribute-based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2018}, url = {https://eprint.iacr.org/2018/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DraganGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/HuangMC17, author = {Kaibin Huang and Mark Manulis and Liqun Chen}, title = {Password Authenticated Keyword Search}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {129--140}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.11}, doi = {10.1109/PAC.2017.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/HuangMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisSKD16, author = {Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham}, title = {Secure modular password authentication for the web using channel bindings}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {6}, pages = {597--620}, year = {2016}, url = {https://doi.org/10.1007/s10207-016-0348-7}, doi = {10.1007/S10207-016-0348-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisSKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Blind Password Registration for Verifier-based {PAKE}}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {39--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898424}, doi = {10.1145/2898420.2898424}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {95--114}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_7}, doi = {10.1007/978-3-319-45871-7\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM16a, author = {Franziskus Kiefer and Mark Manulis}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Universally Composable Two-Server {PAKE}}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {147--166}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_10}, doi = {10.1007/978-3-319-45871-7\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/KieferM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2016, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5}, doi = {10.1007/978-3-319-39555-5}, isbn = {978-3-319-39554-8}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, title = {Blind Password Registration for Verifier-based {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2016}, url = {http://eprint.iacr.org/2016/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM16a, author = {Franziskus Kiefer and Mark Manulis}, title = {Universally Composable Two-Server {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2016}, url = {http://eprint.iacr.org/2016/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KuchtaM15, author = {Veronika Kuchta and Mark Manulis}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Public Key Encryption with Distributed Keyword Search}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {62--83}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_5}, doi = {10.1007/978-3-319-31550-8\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KuchtaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM15, author = {Franziskus Kiefer and Mark Manulis}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Oblivious {PAKE:} Efficient Handling of Password Trials}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {191--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_11}, doi = {10.1007/978-3-319-23318-5\_11}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KieferM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NietoMS14, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, journal = {Comput. J.}, volume = {57}, number = {4}, pages = {510--536}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt029}, doi = {10.1093/COMJNL/BXT029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NietoMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisPS14, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext awareness in identity-based key encapsulation}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {1}, pages = {25--49}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0218-5}, doi = {10.1007/S10207-013-0218-5}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KieferM14, author = {Franziskus Kiefer and Mark Manulis}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {199--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_13}, doi = {10.1007/978-3-319-07536-5\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KieferM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNMS14, author = {Kenneth Radke and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto and Mark Manulis and Douglas Stebila}, editor = {Udaya Parampalli and Ian Welch}, title = {Formalising Human Recognition: a Fundamental Building Block for Security Proofs}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {37--45}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GuntherMP14, author = {Felix G{\"{u}}nther and Mark Manulis and Andreas Peter}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {321--336}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_21}, doi = {10.1007/978-3-319-12280-9\_21}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/GuntherMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KieferM14, author = {Franziskus Kiefer and Mark Manulis}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {295--312}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_17}, doi = {10.1007/978-3-319-11212-1\_17}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KieferM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/KuchtaM14, author = {Veronika Kuchta and Mark Manulis}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Rerandomizable Threshold Blind Signatures}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {70--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_5}, doi = {10.1007/978-3-319-27998-5\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/KuchtaM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/ManulisSD14, author = {Mark Manulis and Douglas Stebila and Nick Denham}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Secure Modular Password Authentication for the Web Using Channel Bindings}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {167--189}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_11}, doi = {10.1007/978-3-319-14054-4\_11}, timestamp = {Sat, 09 Apr 2022 12:41:37 +0200}, biburl = {https://dblp.org/rec/conf/secsr/ManulisSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/FleischhackerMA14, author = {Nils Fleischhacker and Mark Manulis and Amir Azodi}, editor = {Liqun Chen and Chris J. Mitchell}, title = {A Modular Framework for Multi-Factor Authentication and Key Exchange}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {190--214}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_12}, doi = {10.1007/978-3-319-14054-4\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/FleischhackerMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM14, author = {Franziskus Kiefer and Mark Manulis}, title = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2014}, url = {http://eprint.iacr.org/2014/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM14a, author = {Franziskus Kiefer and Mark Manulis}, title = {Distributed Smooth Projective Hashing and its Application to Two-Server {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2014}, url = {http://eprint.iacr.org/2014/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherMP14, author = {Felix G{\"{u}}nther and Mark Manulis and Andreas Peter}, title = {Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2014}, url = {http://eprint.iacr.org/2014/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisSD14, author = {Mark Manulis and Douglas Stebila and Nick Denham}, title = {Secure modular password authentication for the web using channel bindings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2014}, url = {http://eprint.iacr.org/2014/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ManulisSU13, author = {Mark Manulis and Koutarou Suzuki and Berkant Ustaoglu}, title = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {101--110}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.101}, doi = {10.1587/TRANSFUN.E96.A.101}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ManulisSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CristofaroMP13, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private discovery of common social contacts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {49--65}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0183-4}, doi = {10.1007/S10207-012-0183-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AskoxylakisMP13, author = {Ioannis G. Askoxylakis and Mark Manulis and Joachim Posegga}, title = {Security and privacy for digital ecosystems}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {45}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.001}, doi = {10.1016/J.ISTR.2013.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AskoxylakisMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NietoMPRS13, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly verifiable ciphertexts}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {749--778}, year = {2013}, url = {https://doi.org/10.3233/JCS-130473}, doi = {10.3233/JCS-130473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangMAS13, author = {Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo}, editor = {Colin Boyd and Leonie Simpson}, title = {Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {187--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_13}, doi = {10.1007/978-3-642-39059-3\_13}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangMAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KuchtaM13, author = {Veronika Kuchta and Mark Manulis}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {251--270}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_14}, doi = {10.1007/978-3-319-02937-5\_14}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/KuchtaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FleischhackerGKMP13, author = {Nils Fleischhacker and Felix G{\"{u}}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Pseudorandom signatures}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {107--118}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484325}, doi = {10.1145/2484313.2484325}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FleischhackerGKMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM13, author = {Franziskus Kiefer and Mark Manulis}, title = {Oblivious {PAKE} and Efficient Handling of Password Trials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2013}, url = {http://eprint.iacr.org/2013/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMAS13, author = {Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo}, title = {Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2013}, url = {http://eprint.iacr.org/2013/230}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/StelleMH12, author = {Stanislaus Stelle and Mark Manulis and Matthias Hollick}, title = {Topology-Driven Secure Initialization in Wireless Sensor Networks: {A} Tool-Assisted Approach}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {28--37}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.36}, doi = {10.1109/ARES.2012.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/StelleMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FujiokaMSU12, author = {Atsushi Fujioka and Mark Manulis and Koutarou Suzuki and Berkant Ustaoglu}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {15--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_2}, doi = {10.1007/978-3-642-31448-3\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FujiokaMSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Fully Private Revocable Predicate Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {350--363}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_26}, doi = {10.1007/978-3-642-31448-3\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, editor = {Michel Abdalla and Tanja Lange}, title = {Forward-Secure Hierarchical Predicate Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {83--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_6}, doi = {10.1007/978-3-642-36334-4\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Publicly Verifiable Ciphertexts}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {393--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_22}, doi = {10.1007/978-3-642-32928-9\_22}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2012, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5}, doi = {10.1007/978-3-642-35404-5}, isbn = {978-3-642-35403-8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2012, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8}, doi = {10.1007/978-3-642-30057-8}, isbn = {978-3-642-30056-1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12, author = {Jan Camenisch and Mark Manulis and Gene Tsudik and Rebecca N. Wright}, title = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)}, journal = {Dagstuhl Reports}, volume = {2}, number = {9}, pages = {165--183}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.9.165}, doi = {10.4230/DAGREP.2.9.165}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischMTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerMS12, author = {Nils Fleischhacker and Mark Manulis and Amir Azodi}, title = {Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2012}, url = {http://eprint.iacr.org/2012/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2012}, url = {http://eprint.iacr.org/2012/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12a, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Fully Private Revocable Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2012}, url = {http://eprint.iacr.org/2012/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisPS12, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext Awareness in Identity-Based Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2012}, url = {http://eprint.iacr.org/2012/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeroyDCMKB11, author = {Damien Leroy and Gregory Detal and Julien Cathalo and Mark Manulis and Fran{\c{c}}ois Koeune and Olivier Bonaventure}, title = {{SWISH:} Secure WiFi sharing}, journal = {Comput. Networks}, volume = {55}, number = {7}, pages = {1614--1630}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.01.012}, doi = {10.1016/J.COMNET.2011.01.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeroyDCMKB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GorantlaBNM11, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, title = {Modeling key compromise impersonation attacks on group key exchange protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {28:1--28:24}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043629}, doi = {10.1145/2043628.2043629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CristofaroMP11, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Private Discovery of Common Social Contacts}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {147--165}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_9}, doi = {10.1007/978-3-642-21554-4\_9}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/CristofaroMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FischlinLM11, author = {Marc Fischlin and Beno{\^{\i}}t Libert and Mark Manulis}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {468--485}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_25}, doi = {10.1007/978-3-642-25385-0\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FischlinLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FanHM11, author = {Chun{-}I Fan and Ruei{-}Hau Hsu and Mark Manulis}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Group Signature with Constant Revocation Costs for Signers and Verifiers}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {214--233}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_16}, doi = {10.1007/978-3-642-25513-7\_16}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/FanHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManulisP11, author = {Mark Manulis and Bertram Poettering}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Practical affiliation-hiding authentication from improved polynomial interpolation}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {286--295}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966950}, doi = {10.1145/1966913.1966950}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ManulisP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuntherMS11, author = {Felix G{\"{u}}nther and Mark Manulis and Thorsten Strufe}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Cryptographic Treatment of Private User Profiles}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {40--54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_5}, doi = {10.1007/978-3-642-29889-9\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuntherMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ManulisS11, author = {Mark Manulis and Marion Steiner}, title = {{UPBA:} User-Authenticated Property-Based Attestation}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {112--119}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971972}, doi = {10.1109/PST.2011.5971972}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/ManulisS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ManulisP11, author = {Mark Manulis and Bertram Poettering}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {85--99}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_6}, doi = {10.1007/978-3-642-21040-2\_6}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ManulisP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/GuntherMS11, author = {Felix G{\"{u}}nther and Mark Manulis and Thorsten Strufe}, title = {Key management in distributed online social networks}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986171}, doi = {10.1109/WOWMOM.2011.5986171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/GuntherMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroMP11, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private Discovery of Common Social Contacts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2011}, url = {http://eprint.iacr.org/2011/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherMS11, author = {Felix G{\"{u}}nther and Mark Manulis and Thorsten Strufe}, title = {Cryptographic Treatment of Private User Profiles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2011}, url = {http://eprint.iacr.org/2011/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerGKMP11, author = {Nils Fleischhacker and Felix G{\"{u}}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, title = {Pseudorandom Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2011}, url = {http://eprint.iacr.org/2011/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CatuognoLMSSW10, author = {Luigi Catuogno and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marcel Winandy}, title = {Trusted virtual domains: Color your network}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {289--294}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0089-0}, doi = {10.1007/S11623-010-0089-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/ManulisS10, author = {Mark Manulis and Ahmad{-}Reza Sadeghi}, title = {Key agreement for heterogeneous mobile ad-hoc groups}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {4}, number = {1}, pages = {17--30}, year = {2010}, url = {https://doi.org/10.1504/IJWMC.2010.030972}, doi = {10.1504/IJWMC.2010.030972}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/ManulisS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10, author = {Christina Brzuska and Heike Busch and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Martin Franz and Stefan Katzenbeisser and Mark Manulis and Cristina Onete and Andreas Peter and Bertram Poettering and Dominique Schr{\"{o}}der}, editor = {Jianying Zhou and Moti Yung}, title = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {87--104}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_6}, doi = {10.1007/978-3-642-13708-2\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ManulisPT10, author = {Mark Manulis and Bertram Poettering and Gene Tsudik}, editor = {Jianying Zhou and Moti Yung}, title = {Affiliation-Hiding Key Exchange with Untrusted Group Authorities}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {402--419}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_24}, doi = {10.1007/978-3-642-13708-2\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ManulisPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ManulisPP10, author = {Mark Manulis and Benny Pinkas and Bertram Poettering}, editor = {Jianying Zhou and Moti Yung}, title = {Privacy-Preserving Group Discovery with Linear Complexity}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {420--437}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_25}, doi = {10.1007/978-3-642-13708-2\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ManulisPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10, author = {David Galindo and Beno{\^{\i}}t Libert and Marc Fischlin and Georg Fuchsbauer and Anja Lehmann and Mark Manulis and Dominique Schr{\"{o}}der}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {333--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_20}, doi = {10.1007/978-3-642-12678-9\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10, author = {Michel Abdalla and C{\'{e}}line Chevalier and Mark Manulis and David Pointcheval}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Flexible Group Key Exchange with On-demand Computation of Subgroup Keys}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {351--368}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_21}, doi = {10.1007/978-3-642-12678-9\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ChristinHM10, author = {Delphine Christin and Matthias Hollick and Mark Manulis}, title = {Security and Privacy Objectives for Sensing Applications in Wireless Community Networks}, booktitle = {Proceedings of the 19th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2010, Z{\"{u}}rich, Switzerland, August 2-5, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICCCN.2010.5560129}, doi = {10.1109/ICCCN.2010.5560129}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ChristinHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/Manulis10, author = {Mark Manulis}, title = {Privacy-preserving admission to mobile peer-to-peer groups}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, pages = {111--116}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470612}, doi = {10.1109/PERCOMW.2010.5470612}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/Manulis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ManulisPT10, author = {Mark Manulis and Bertram Poettering and Gene Tsudik}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Taming Big Brother Ambitions: More Privacy for Secret Handshakes}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {149--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_9}, doi = {10.1007/978-3-642-14527-8\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ManulisPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DentFMSS10, author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"{o}}der}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Confidential Signatures and Deterministic Signcryption}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {462--479}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_27}, doi = {10.1007/978-3-642-13013-7\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/social/CutilloMS10, author = {Leucio Antonio Cutillo and Mark Manulis and Thorsten Strufe}, editor = {Borko Furht}, title = {Security and Privacy in Online Social Networks}, booktitle = {Handbook of Social Network Technologies and Applications}, pages = {497--522}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7142-5\_23}, doi = {10.1007/978-1-4419-7142-5\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/social/CutilloMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisP10, author = {Mark Manulis and Bertram Poettering}, title = {Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2010}, url = {http://eprint.iacr.org/2010/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GajekMS09, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, title = {User-aware provably secure protocols for browser-based mutual authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {290--308}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028028}, doi = {10.1504/IJACT.2009.028028}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GajekMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ManulisS09, author = {Mark Manulis and J{\"{o}}rg Schwenk}, title = {Security model and framework for information aggregation in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {5}, number = {2}, pages = {13:1--13:28}, year = {2009}, url = {https://doi.org/10.1145/1498915.1498919}, doi = {10.1145/1498915.1498919}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ManulisS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Manulis09, author = {Mark Manulis}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {1--19}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_1}, doi = {10.1007/978-3-642-01957-9\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Manulis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BrecherBM09, author = {Timo Brecher and Emmanuel Bresson and Mark Manulis}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Fully Robust Tree-Diffie-Hellman Group Key Exchange}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {478--497}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_33}, doi = {10.1007/978-3-642-10433-6\_33}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BrecherBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManulisLKBQ09, author = {Mark Manulis and Damien Leroy and Fran{\c{c}}ois Koeune and Olivier Bonaventure and Jean{-}Jacques Quisquater}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Authenticated wireless roaming via tunnels: making mobile guests feel at home}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {92--103}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533072}, doi = {10.1145/1533057.1533072}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ManulisLKBQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/LeroyMB09, author = {Damien Leroy and Mark Manulis and Olivier Bonaventure}, editor = {Paulo Mendes and Oliver Marc{\'{e}} and Rute C. Sofia}, title = {Enhanced wireless roaming security using three-party authentication and tunnels}, booktitle = {Proceedings of the 1st {ACM} workshop on User-provided networking: challenges and opportunities, U-NET@CoNEXT 2009, Rome, Italy, December 1, 2009}, pages = {7--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1659029.1659032}, doi = {10.1145/1659029.1659032}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/LeroyMB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GorantlaBNM09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Generic One Round Group Key Exchange in the Standard Model}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {1--15}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_1}, doi = {10.1007/978-3-642-14423-3\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GorantlaBNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ManulisSU09, author = {Mark Manulis and Koutarou Suzuki and Berkant Ustaoglu}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {16--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_2}, doi = {10.1007/978-3-642-14423-3\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ManulisSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/CatuognoLMSW09, author = {Luigi Catuogno and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Adam Moskowitz}, title = {Transparent Mobile Storage Protection in Trusted Virtual Domains}, booktitle = {Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, {USA}}, pages = {159--172}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/lisa09/tech/full\_papers/catuogno.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/CatuognoLMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Manulis09, author = {Mark Manulis}, editor = {Heung Youl Youm and Moti Yung}, title = {Securing Remote Access Inside Wireless Mesh Networks}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {324--338}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_24}, doi = {10.1007/978-3-642-10838-9\_24}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Manulis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBNM09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis}, title = {Generic One Round Group Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2009}, url = {http://eprint.iacr.org/2009/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DentFMSS09, author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"{o}}der}, title = {Confidential Signatures and Deterministic Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2009}, url = {http://eprint.iacr.org/2009/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DentFMSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BressonM08, author = {Emmanuel Bresson and Mark Manulis}, title = {Contributory group key exchange in the presence of malicious participants}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {85--93}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070113}, doi = {10.1049/IET-IFS:20070113}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BressonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BressonM08, author = {Emmanuel Bresson and Mark Manulis}, title = {Securing group key exchange against strong corruptions and key registration attacks}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {91--107}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021083}, doi = {10.1504/IJACT.2008.021083}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BressonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08, author = {Romain Robert and Mark Manulis and Florence De Villenfagne and Damien Leroy and Julien Jost and Fran{\c{c}}ois Koeune and Caroline Ker and Jean{-}Marc Dinant and Yves Poullet and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {WiFi Roaming: Legal Implications and Security Constraints}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {205--241}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean016}, doi = {10.1093/IJLIT/EAN016}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GajekMS08, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {6--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_2}, doi = {10.1007/978-3-540-70500-0\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GajekMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonM08, author = {Emmanuel Bresson and Mark Manulis}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Securing group key exchange against strong corruptions}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {249--260}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368347}, doi = {10.1145/1368310.1368347}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GajekMSS08, author = {Sebastian Gajek and Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Provably secure browser-based user-aware mutual authentication over {TLS}}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {300--311}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368354}, doi = {10.1145/1368310.1368354}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GajekMSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GajekJMS08, author = {Sebastian Gajek and Tibor Jager and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A Browser-Based Kerberos Authentication Scheme}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {115--129}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_8}, doi = {10.1007/978-3-540-88313-5\_8}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GajekJMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ArmknechtELMS08, author = {Frederik Armknecht and Alberto N. Escalante and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {29--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_3}, doi = {10.1007/978-3-540-79104-1\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ArmknechtELMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenLMS08, author = {Liqun Chen and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Property-Based Attestation without a Trusted Third Party}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {31--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_3}, doi = {10.1007/978-3-540-85886-7\_3}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChenLMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Universally Composable Security Analysis of {TLS}}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {313--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_22}, doi = {10.1007/978-3-540-88733-1\_22}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, title = {Universally Composable Security Analysis of {TLS} - Secure Sessions with Handshake and Record Layer Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2008}, url = {http://eprint.iacr.org/2008/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisLKBQ08, author = {Mark Manulis and Damien Leroy and Fran{\c{c}}ois Koeune and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2008}, url = {http://eprint.iacr.org/2008/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Manulis2007, author = {Mark Manulis}, title = {Provably secure group key exchange}, school = {Ruhr University Bochum}, year = {2007}, url = {https://d-nb.info/985305509}, isbn = {978-3-89966-275-7}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Manulis2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiaoM07, author = {Lijun Liao and Mark Manulis}, title = {Tree-based group key agreement framework for mobile ad-hoc networks}, journal = {Future Gener. Comput. Syst.}, volume = {23}, number = {6}, pages = {787--803}, year = {2007}, url = {https://doi.org/10.1016/j.future.2007.01.001}, doi = {10.1016/J.FUTURE.2007.01.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/LiaoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/BressonM07, author = {Emmanuel Bresson and Mark Manulis}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {395--409}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_41}, doi = {10.1007/978-3-540-73547-2\_41}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/BressonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenELMS07, author = {Liqun Chen and Alberto N. Escalante and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi}, editor = {Sven Dietrich and Rachna Dhamija}, title = {A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {29--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_4}, doi = {10.1007/978-3-540-77366-5\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChenELMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ManulisS07, author = {Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Provably Secure Framework for Information Aggregation in Sensor Networks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4705}, pages = {603--621}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74472-6\_49}, doi = {10.1007/978-3-540-74472-6\_49}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ManulisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BressonMS07, author = {Emmanuel Bresson and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {292--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_20}, doi = {10.1007/978-3-540-75651-4\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisS07, author = {Mark Manulis and J{\"{o}}rg Schwenk}, title = {Provably Secure Framework for Information Aggregation is Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2007}, url = {http://eprint.iacr.org/2007/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LiaoM06, author = {Lijun Liao and Mark Manulis}, title = {Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {5--9}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.336}, doi = {10.1109/AINA.2006.336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LiaoM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ManulisS06, author = {Mark Manulis and Ahmad{-}Reza Sadeghi}, title = {Property-Based Taming of Lying Mobile Nodes}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {476--480}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.276}, doi = {10.1109/AINA.2006.276}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ManulisS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Manulis06, author = {Mark Manulis}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Democratic group signatures: on an example of joint ventures}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {365}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128882}, doi = {10.1145/1128817.1128882}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Manulis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ManulisSS06, author = {Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Linkable Democratic Group Signatures}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {187--201}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_18}, doi = {10.1007/11689522\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ManulisSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisSS06, author = {Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, title = {Linkable Democratic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2006}, url = {http://eprint.iacr.org/2006/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonMS06, author = {Emmanuel Bresson and Mark Manulis and J{\"{o}}rg Schwenk}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2006}, url = {http://eprint.iacr.org/2006/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Manulis06, author = {Mark Manulis}, title = {Survey on Security Requirements and Models for Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2006}, url = {http://eprint.iacr.org/2006/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Manulis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Manulis06a, author = {Mark Manulis}, title = {Security-Focused Survey on Group Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2006}, url = {http://eprint.iacr.org/2006/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Manulis06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/Manulis05, author = {Mark Manulis}, title = {Key Agreement for Heterogeneous Mobile Ad-Hoc Groups}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {290--294}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.177}, doi = {10.1109/ICPADS.2005.177}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/Manulis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/Manulis05, author = {Mark Manulis}, title = {Contributory group key agreement protocols, revisited for mobile ad-hoc groups}, booktitle = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MAHSS.2005.1542876}, doi = {10.1109/MAHSS.2005.1542876}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/Manulis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Manulis05, author = {Mark Manulis}, title = {Democratic Group Signatures on Example of Joint Ventures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2005}, url = {http://eprint.iacr.org/2005/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Manulis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ManulisS04, author = {Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on {IDH}}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {107--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_10}, doi = {10.1007/978-3-540-30496-8\_10}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ManulisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.