BibTeX records: Mark Manulis

download as .bib file

@proceedings{DBLP:conf/secitc/2023,
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-52947-4},
  doi          = {10.1007/978-3-031-52947-4},
  isbn         = {978-3-031-52946-7},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MengCTML24,
  author       = {Long Meng and
                  Liqun Chen and
                  Yangguang Tian and
                  Mark Manulis and
                  Suhui Liu},
  title        = {{FEASE:} Fast and Expressive Asymmetric Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/054},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MengCTML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisN24,
  author       = {Mark Manulis and
                  J{\'{e}}r{\^{o}}me Nguyen},
  title        = {Fully Homomorphic Encryption beyond {IND-CCA1} Security: Integrity
                  through Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/202},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrymannGMN23,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis and
                  Hugo Nartz},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {394--421},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_15},
  doi          = {10.1007/978-3-031-33488-7\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FrymannGMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/FrymannGM23,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis},
  title        = {Asynchronous Remote Key Generation for Post-Quantum Cryptosystems
                  from Lattices},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {928--941},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00059},
  doi          = {10.1109/EUROSP57164.2023.00059},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/FrymannGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2023,
  editor       = {Shujun Li and
                  Mark Manulis and
                  Atsuko Miyaji},
  title        = {Network and System Security - 17th International Conference, {NSS}
                  2023, Canterbury, UK, August 14-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13983},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39828-5},
  doi          = {10.1007/978-3-031-39828-5},
  isbn         = {978-3-031-39827-8},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrymannGM23,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis},
  title        = {Asynchronous Remote Key Generation for Post-Quantum Cryptosystems
                  from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/419},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrymannGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrymannGMN23,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis and
                  Hugo Nartz},
  title        = {Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/456},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrymannGMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangCCDMSMBJM22,
  author       = {Yifan Yang and
                  Daniel Cooper and
                  John P. Collomosse and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Jamie Steane and
                  Arthi Manohar and
                  Jo Briggs and
                  Helen S. Jones and
                  Wendy Moncur},
  title        = {{TAPESTRY:} {A} De-Centralized Service for Trusted Interaction Online},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {1385--1398},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.2993081},
  doi          = {10.1109/TSC.2020.2993081},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangCCDMSMBJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GardhamM22,
  author       = {Daniel Gardham and
                  Mark Manulis},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Revocable Hierarchical Attribute-Based Signatures from Lattices},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {459--479},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_23},
  doi          = {10.1007/978-3-031-09234-3\_23},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GardhamM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/CaballeroKSTTBC22,
  author       = {M. Caballero and
                  Dimitris Kavallieros and
                  A. Spyros and
                  A. Tavernarakisv and
                  Athanasios Tziouvaras and
                  Stefano Bonacina and
                  K. Chandrarmouli and
                  M. Coroiu and
                  L. Chen and
                  T. Dounia and
                  I. Giannoulakis and
                  N. Gligoric and
                  Emmanouil Kafetzakis and
                  T. Kasig and
                  Vaios Koumaras and
                  T. Krousarlis and
                  K. Lapidaki and
                  A. Markakis and
                  S. Marin and
                  Mark Manulis and
                  Sofia{-}Anna Menesidou and
                  S. Nifakos and
                  L. Meng and
                  S. Mhiri and
                  M. Nati and
                  K. Ntafloukas and
                  D. Oniga and
                  Dimitrios Papamartzivanos and
                  Spyros Papastergiou and
                  K. Sanchez and
                  Christos Sakkas and
                  K. Stelliou and
                  L. Trujillo and
                  Theodora Tsikrika and
                  E. Venegas and
                  Stefanos Vrochidis and
                  D. Xydias},
  title        = {{ICT} in Healthcare: the role of IoT and the {SECANT} solution},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {104--111},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850319},
  doi          = {10.1109/CSR54599.2022.9850319},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csr2/CaballeroKSTTBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FrymannGM22,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Unlinkable Delegation of WebAuthn Credentials},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {125--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_7},
  doi          = {10.1007/978-3-031-17143-7\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/FrymannGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrymannGM22,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Mark Manulis},
  title        = {Unlinkable Delegation of WebAuthn Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/303},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FrymannGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GardhamM22,
  author       = {Daniel Gardham and
                  Mark Manulis},
  title        = {Revocable Hierarchical Attribute-based Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/397},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GardhamM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisBHSD21,
  author       = {Mark Manulis and
                  Christopher P. Bridges and
                  R. Harrison and
                  Venkkatesh Sekar and
                  Andy Davis},
  title        = {Cyber security in New Space},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {3},
  pages        = {287--311},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00503-w},
  doi          = {10.1007/S10207-020-00503-W},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisBHSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenHMS21,
  author       = {Liqun Chen and
                  Kaibin Huang and
                  Mark Manulis and
                  Venkkatesh Sekar},
  title        = {Password-authenticated searchable encryption},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {5},
  pages        = {675--693},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00524-5},
  doi          = {10.1007/S10207-020-00524-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenHMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GardhamMD20,
  author       = {Daniel Gardham and
                  Mark Manulis and
                  Constantin Catalin Dragan},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Biometric-Authenticated Searchable Encryption},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {40--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_3},
  doi          = {10.1007/978-3-030-57878-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GardhamMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrymannGKLMN20,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Franziskus Kiefer and
                  Emil Lundberg and
                  Mark Manulis and
                  Dain Nilsson},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal
                  for {W3C} WebAuthn},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {939--954},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417292},
  doi          = {10.1145/3372297.3417292},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FrymannGKLMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CaseyMNST20,
  author       = {Matthew Casey and
                  Mark Manulis and
                  Christopher J. P. Newton and
                  Robin Savage and
                  Helen Treharne},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {An Interoperable Architecture for Usable Password-Less Authentication},
  booktitle    = {Emerging Technologies for Authorization and Authentication - Third
                  International Workshop, {ETAA} 2020, Guildford, UK, September 18,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12515},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64455-0\_2},
  doi          = {10.1007/978-3-030-64455-0\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CaseyMNST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DraganM20,
  author       = {Constantin Catalin Dragan and
                  Mark Manulis},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {KYChain: user-controlled {KYC} data sharing and certification},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {301--307},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373895},
  doi          = {10.1145/3341105.3373895},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DraganM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020detips,
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3},
  doi          = {10.1007/978-3-030-66504-3},
  isbn         = {978-3-030-66503-6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2020detips.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-01659,
  author       = {Constantin Catalin Dragan and
                  Mark Manulis},
  title        = {KYChain: User-Controlled {KYC} Data Sharing and Certification},
  journal      = {CoRR},
  volume       = {abs/2001.01659},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.01659},
  eprinttype    = {arXiv},
  eprint       = {2001.01659},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-01659.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GardhamMD20,
  author       = {Daniel Gardham and
                  Mark Manulis and
                  Constantin Catalin Dragan},
  title        = {Biometric-Authenticated Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GardhamMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrymannGKLMN20,
  author       = {Nick Frymann and
                  Daniel Gardham and
                  Franziskus Kiefer and
                  Emil Lundberg and
                  Mark Manulis and
                  Dain Nilsson},
  title        = {Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal
                  for {W3C} WebAuthn},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1004},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrymannGKLMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GardhamM19,
  author       = {Daniel Gardham and
                  Mark Manulis},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature
                  Length},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {89--109},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_5},
  doi          = {10.1007/978-3-030-21568-2\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GardhamM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuM19,
  author       = {Jia Liu and
                  Mark Manulis},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {pRate: Anonymous Star Rating with Rating Secrecy},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {550--570},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_27},
  doi          = {10.1007/978-3-030-21568-2\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RubioMAL19,
  author       = {Juan E. Rubio and
                  Mark Manulis and
                  Cristina Alcaraz and
                  Javier L{\'{o}}pez},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Enhancing Security and Dependability of Industrial Networks with Opinion
                  Dynamics},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {263--280},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_13},
  doi          = {10.1007/978-3-030-29962-0\_13},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RubioMAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-06186,
  author       = {Yifan Yang and
                  Daniel Cooper and
                  John P. Collomosse and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Jamie Steane and
                  Arthi Manohar and
                  Jo Briggs and
                  Helen S. Jones and
                  Wendy Moncur},
  title        = {{TAPESTRY:} {A} Blockchain based Service for Trusted Interaction Online},
  journal      = {CoRR},
  volume       = {abs/1905.06186},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.06186},
  eprinttype    = {arXiv},
  eprint       = {1905.06186},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-06186.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05064,
  author       = {Nick Frymann and
                  Mark Manulis},
  title        = {Securing Fleets of Consumer Drones at Low Cost},
  journal      = {CoRR},
  volume       = {abs/1912.05064},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.05064},
  eprinttype    = {arXiv},
  eprint       = {1912.05064},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-05064.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuM19,
  author       = {Jia Liu and
                  Mark Manulis},
  title        = {pRate: Anonymous Star Rating with Rating Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GardhamM19,
  author       = {Daniel Gardham and
                  Mark Manulis},
  title        = {Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature
                  Length},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GardhamM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DraganGM18,
  author       = {Constantin Catalin Dragan and
                  Daniel Gardham and
                  Mark Manulis},
  editor       = {Jan Camenisch and
                  Panos Papadimitratos},
  title        = {Hierarchical Attribute-Based Signatures},
  booktitle    = {Cryptology and Network Security - 17th International Conference, {CANS}
                  2018, Naples, Italy, September 30 - October 3, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11124},
  pages        = {213--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00434-7\_11},
  doi          = {10.1007/978-3-030-00434-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DraganGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DraganM18,
  author       = {Constantin Catalin Dragan and
                  Mark Manulis},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Giovanni Livraga and
                  Ruben Rios},
  title        = {Bootstrapping Online Trust: Timeline Activity Proofs},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018,
                  Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11025},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00305-0\_18},
  doi          = {10.1007/978-3-030-00305-0\_18},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DraganM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2018,
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8},
  doi          = {10.1007/978-3-319-99136-8},
  isbn         = {978-3-319-99135-1},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DraganGM18,
  author       = {Constantin Catalin Dragan and
                  Daniel Gardham and
                  Mark Manulis},
  title        = {Hierarchical Attribute-based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DraganGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/HuangMC17,
  author       = {Kaibin Huang and
                  Mark Manulis and
                  Liqun Chen},
  title        = {Password Authenticated Keyword Search},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {129--140},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.11},
  doi          = {10.1109/PAC.2017.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/HuangMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisSKD16,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Franziskus Kiefer and
                  Nick Denham},
  title        = {Secure modular password authentication for the web using channel bindings},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {6},
  pages        = {597--620},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-016-0348-7},
  doi          = {10.1007/S10207-016-0348-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisSKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Blind Password Registration for Verifier-based {PAKE}},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898424},
  doi          = {10.1145/2898420.2898424},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Blind Password Registration for Two-Server Password Authenticated
                  Key Exchange and Secret Sharing Protocols},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {95--114},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_7},
  doi          = {10.1007/978-3-319-45871-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM16a,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Universally Composable Two-Server {PAKE}},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_10},
  doi          = {10.1007/978-3-319-45871-7\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5},
  doi          = {10.1007/978-3-319-39555-5},
  isbn         = {978-3-319-39554-8},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Blind Password Registration for Verifier-based {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM16a,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Universally Composable Two-Server {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuchtaM15,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Public Key Encryption with Distributed Keyword Search},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {62--83},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_5},
  doi          = {10.1007/978-3-319-31550-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KuchtaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM15,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Oblivious {PAKE:} Efficient Handling of Password Trials},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_11},
  doi          = {10.1007/978-3-319-23318-5\_11},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NietoMS14,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {4},
  pages        = {510--536},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt029},
  doi          = {10.1093/COMJNL/BXT029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/NietoMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisPS14,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext awareness in identity-based key encapsulation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {1},
  pages        = {25--49},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0218-5},
  doi          = {10.1007/S10207-013-0218-5},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KieferM14,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Distributed Smooth Projective Hashing and Its Application to Two-Server
                  Password Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_13},
  doi          = {10.1007/978-3-319-07536-5\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KieferM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNMS14,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Douglas Stebila},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Formalising Human Recognition: a Fundamental Building Block for Security
                  Proofs},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {37--45},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GuntherMP14,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Andreas Peter},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Privacy-Enhanced Participatory Sensing with Collusion Resistance and
                  Data Aggregation},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {321--336},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_21},
  doi          = {10.1007/978-3-319-12280-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GuntherMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KieferM14,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_17},
  doi          = {10.1007/978-3-319-11212-1\_17},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KieferM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KuchtaM14,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Rerandomizable Threshold Blind Signatures},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {70--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_5},
  doi          = {10.1007/978-3-319-27998-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KuchtaM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ManulisSD14,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Nick Denham},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Secure Modular Password Authentication for the Web Using Channel Bindings},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {167--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_11},
  doi          = {10.1007/978-3-319-14054-4\_11},
  timestamp    = {Sat, 09 Apr 2022 12:41:37 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ManulisSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/FleischhackerMA14,
  author       = {Nils Fleischhacker and
                  Mark Manulis and
                  Amir Azodi},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {A Modular Framework for Multi-Factor Authentication and Key Exchange},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {190--214},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_12},
  doi          = {10.1007/978-3-319-14054-4\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/FleischhackerMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM14,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM14a,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Distributed Smooth Projective Hashing and its Application to Two-Server
                  {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherMP14,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Andreas Peter},
  title        = {Privacy-Enhanced Participatory Sensing with Collusion-Resistance and
                  Data Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisSD14,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Nick Denham},
  title        = {Secure modular password authentication for the web using channel bindings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ManulisSU13,
  author       = {Mark Manulis and
                  Koutarou Suzuki and
                  Berkant Ustaoglu},
  title        = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {101--110},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.101},
  doi          = {10.1587/TRANSFUN.E96.A.101},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ManulisSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CristofaroMP13,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private discovery of common social contacts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {49--65},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0183-4},
  doi          = {10.1007/S10207-012-0183-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AskoxylakisMP13,
  author       = {Ioannis G. Askoxylakis and
                  Mark Manulis and
                  Joachim Posegga},
  title        = {Security and privacy for digital ecosystems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {45},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.001},
  doi          = {10.1016/J.ISTR.2013.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AskoxylakisMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NietoMPRS13,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly verifiable ciphertexts},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {749--778},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130473},
  doi          = {10.3233/JCS-130473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangMAS13,
  author       = {Yang Wang and
                  Mark Manulis and
                  Man Ho Au and
                  Willy Susilo},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Relations among Privacy Notions for Signcryption and Key Invisible
                  "Sign-then-Encrypt"},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_13},
  doi          = {10.1007/978-3-642-39059-3\_13},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangMAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KuchtaM13,
  author       = {Veronika Kuchta and
                  Mark Manulis},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {Unique Aggregate Signatures with Applications to Distributed Verifiable
                  Random Functions},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {251--270},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_14},
  doi          = {10.1007/978-3-319-02937-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KuchtaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FleischhackerGKMP13,
  author       = {Nils Fleischhacker and
                  Felix G{\"{u}}nther and
                  Franziskus Kiefer and
                  Mark Manulis and
                  Bertram Poettering},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Pseudorandom signatures},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484325},
  doi          = {10.1145/2484313.2484325},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FleischhackerGKMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM13,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Oblivious {PAKE} and Efficient Handling of Password Trials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMAS13,
  author       = {Yang Wang and
                  Mark Manulis and
                  Man Ho Au and
                  Willy Susilo},
  title        = {Relations among Privacy Notions for Signcryption and Key Invisible
                  "Sign-then-Encrypt"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/230},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/StelleMH12,
  author       = {Stanislaus Stelle and
                  Mark Manulis and
                  Matthias Hollick},
  title        = {Topology-Driven Secure Initialization in Wireless Sensor Networks:
                  {A} Tool-Assisted Approach},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {28--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.36},
  doi          = {10.1109/ARES.2012.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/StelleMH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FujiokaMSU12,
  author       = {Atsushi Fujioka and
                  Mark Manulis and
                  Koutarou Suzuki and
                  Berkant Ustaoglu},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite
                  Key Exchange},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_2},
  doi          = {10.1007/978-3-642-31448-3\_2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FujiokaMSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Fully Private Revocable Predicate Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_26},
  doi          = {10.1007/978-3-642-31448-3\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {83--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_6},
  doi          = {10.1007/978-3-642-36334-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Publicly Verifiable Ciphertexts},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_22},
  doi          = {10.1007/978-3-642-32928-9\_22},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2012,
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5},
  doi          = {10.1007/978-3-642-35404-5},
  isbn         = {978-3-642-35403-8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8},
  doi          = {10.1007/978-3-642-30057-8},
  isbn         = {978-3-642-30056-1},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12,
  author       = {Jan Camenisch and
                  Mark Manulis and
                  Gene Tsudik and
                  Rebecca N. Wright},
  title        = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {9},
  pages        = {165--183},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.9.165},
  doi          = {10.4230/DAGREP.2.9.165},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischMTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerMS12,
  author       = {Nils Fleischhacker and
                  Mark Manulis and
                  Amir Azodi},
  title        = {Modular Design and Analysis Framework for Multi-Factor Authentication
                  and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly Verifiable Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12a,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Fully Private Revocable Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisPS12,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext Awareness in Identity-Based Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeroyDCMKB11,
  author       = {Damien Leroy and
                  Gregory Detal and
                  Julien Cathalo and
                  Mark Manulis and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure},
  title        = {{SWISH:} Secure WiFi sharing},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {7},
  pages        = {1614--1630},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.01.012},
  doi          = {10.1016/J.COMNET.2011.01.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LeroyDCMKB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GorantlaBNM11,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  title        = {Modeling key compromise impersonation attacks on group key exchange
                  protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {28:1--28:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043629},
  doi          = {10.1145/2043628.2043629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CristofaroMP11,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Private Discovery of Common Social Contacts},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {147--165},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_9},
  doi          = {10.1007/978-3-642-21554-4\_9},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CristofaroMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FischlinLM11,
  author       = {Marc Fischlin and
                  Beno{\^{\i}}t Libert and
                  Mark Manulis},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Non-interactive and Re-usable Universally Composable String Commitments
                  with Adaptive Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {468--485},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_25},
  doi          = {10.1007/978-3-642-25385-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FischlinLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FanHM11,
  author       = {Chun{-}I Fan and
                  Ruei{-}Hau Hsu and
                  Mark Manulis},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Group Signature with Constant Revocation Costs for Signers and Verifiers},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {214--233},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_16},
  doi          = {10.1007/978-3-642-25513-7\_16},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/FanHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManulisP11,
  author       = {Mark Manulis and
                  Bertram Poettering},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Practical affiliation-hiding authentication from improved polynomial
                  interpolation},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {286--295},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966950},
  doi          = {10.1145/1966913.1966950},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ManulisP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuntherMS11,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Thorsten Strufe},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Cryptographic Treatment of Private User Profiles},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_5},
  doi          = {10.1007/978-3-642-29889-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GuntherMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ManulisS11,
  author       = {Mark Manulis and
                  Marion Steiner},
  title        = {{UPBA:} User-Authenticated Property-Based Attestation},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {112--119},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971972},
  doi          = {10.1109/PST.2011.5971972},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/ManulisS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ManulisP11,
  author       = {Mark Manulis and
                  Bertram Poettering},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_6},
  doi          = {10.1007/978-3-642-21040-2\_6},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ManulisP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/GuntherMS11,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Thorsten Strufe},
  title        = {Key management in distributed online social networks},
  booktitle    = {12th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
                  2011},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WoWMoM.2011.5986171},
  doi          = {10.1109/WOWMOM.2011.5986171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/GuntherMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroMP11,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private Discovery of Common Social Contacts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherMS11,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Thorsten Strufe},
  title        = {Cryptographic Treatment of Private User Profiles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerGKMP11,
  author       = {Nils Fleischhacker and
                  Felix G{\"{u}}nther and
                  Franziskus Kiefer and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Pseudorandom Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CatuognoLMSSW10,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marcel Winandy},
  title        = {Trusted virtual domains: Color your network},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {289--294},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0089-0},
  doi          = {10.1007/S11623-010-0089-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/ManulisS10,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  title        = {Key agreement for heterogeneous mobile ad-hoc groups},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {17--30},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJWMC.2010.030972},
  doi          = {10.1504/IJWMC.2010.030972},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/ManulisS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10,
  author       = {Christina Brzuska and
                  Heike Busch and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Martin Franz and
                  Stefan Katzenbeisser and
                  Mark Manulis and
                  Cristina Onete and
                  Andreas Peter and
                  Bertram Poettering and
                  Dominique Schr{\"{o}}der},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {87--104},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_6},
  doi          = {10.1007/978-3-642-13708-2\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ManulisPT10,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Gene Tsudik},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Affiliation-Hiding Key Exchange with Untrusted Group Authorities},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {402--419},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_24},
  doi          = {10.1007/978-3-642-13708-2\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ManulisPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ManulisPP10,
  author       = {Mark Manulis and
                  Benny Pinkas and
                  Bertram Poettering},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Privacy-Preserving Group Discovery with Linear Complexity},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {420--437},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_25},
  doi          = {10.1007/978-3-642-13708-2\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ManulisPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10,
  author       = {David Galindo and
                  Beno{\^{\i}}t Libert and
                  Marc Fischlin and
                  Georg Fuchsbauer and
                  Anja Lehmann and
                  Mark Manulis and
                  Dominique Schr{\"{o}}der},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Public-Key Encryption with Non-Interactive Opening: New Constructions
                  and Stronger Definitions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_20},
  doi          = {10.1007/978-3-642-12678-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  Mark Manulis and
                  David Pointcheval},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Flexible Group Key Exchange with On-demand Computation of Subgroup
                  Keys},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_21},
  doi          = {10.1007/978-3-642-12678-9\_21},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ChristinHM10,
  author       = {Delphine Christin and
                  Matthias Hollick and
                  Mark Manulis},
  title        = {Security and Privacy Objectives for Sensing Applications in Wireless
                  Community Networks},
  booktitle    = {Proceedings of the 19th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2010, Z{\"{u}}rich, Switzerland,
                  August 2-5, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCCN.2010.5560129},
  doi          = {10.1109/ICCCN.2010.5560129},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ChristinHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Manulis10,
  author       = {Mark Manulis},
  title        = {Privacy-preserving admission to mobile peer-to-peer groups},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  pages        = {111--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470612},
  doi          = {10.1109/PERCOMW.2010.5470612},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/Manulis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ManulisPT10,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Gene Tsudik},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Taming Big Brother Ambitions: More Privacy for Secret Handshakes},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_9},
  doi          = {10.1007/978-3-642-14527-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ManulisPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DentFMSS10,
  author       = {Alexander W. Dent and
                  Marc Fischlin and
                  Mark Manulis and
                  Martijn Stam and
                  Dominique Schr{\"{o}}der},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Confidential Signatures and Deterministic Signcryption},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {462--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_27},
  doi          = {10.1007/978-3-642-13013-7\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/social/CutilloMS10,
  author       = {Leucio Antonio Cutillo and
                  Mark Manulis and
                  Thorsten Strufe},
  editor       = {Borko Furht},
  title        = {Security and Privacy in Online Social Networks},
  booktitle    = {Handbook of Social Network Technologies and Applications},
  pages        = {497--522},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7142-5\_23},
  doi          = {10.1007/978-1-4419-7142-5\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/social/CutilloMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisP10,
  author       = {Mark Manulis and
                  Bertram Poettering},
  title        = {Practical Affiliation-Hiding Authentication from Improved Polynomial
                  Interpolation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GajekMS09,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {User-aware provably secure protocols for browser-based mutual authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {290--308},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028028},
  doi          = {10.1504/IJACT.2009.028028},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GajekMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ManulisS09,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {Security model and framework for information aggregation in sensor
                  networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {5},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2009},
  url          = {https://doi.org/10.1145/1498915.1498919},
  doi          = {10.1145/1498915.1498919},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ManulisS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Manulis09,
  author       = {Mark Manulis},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {1--19},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_1},
  doi          = {10.1007/978-3-642-01957-9\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Manulis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BrecherBM09,
  author       = {Timo Brecher and
                  Emmanuel Bresson and
                  Mark Manulis},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Fully Robust Tree-Diffie-Hellman Group Key Exchange},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {478--497},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_33},
  doi          = {10.1007/978-3-642-10433-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BrecherBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManulisLKBQ09,
  author       = {Mark Manulis and
                  Damien Leroy and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Authenticated wireless roaming via tunnels: making mobile guests feel
                  at home},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {92--103},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533072},
  doi          = {10.1145/1533057.1533072},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ManulisLKBQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/LeroyMB09,
  author       = {Damien Leroy and
                  Mark Manulis and
                  Olivier Bonaventure},
  editor       = {Paulo Mendes and
                  Oliver Marc{\'{e}} and
                  Rute C. Sofia},
  title        = {Enhanced wireless roaming security using three-party authentication
                  and tunnels},
  booktitle    = {Proceedings of the 1st {ACM} workshop on User-provided networking:
                  challenges and opportunities, U-NET@CoNEXT 2009, Rome, Italy, December
                  1, 2009},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1659029.1659032},
  doi          = {10.1145/1659029.1659032},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/LeroyMB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GorantlaBNM09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Generic One Round Group Key Exchange in the Standard Model},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_1},
  doi          = {10.1007/978-3-642-14423-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GorantlaBNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ManulisSU09,
  author       = {Mark Manulis and
                  Koutarou Suzuki and
                  Berkant Ustaoglu},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_2},
  doi          = {10.1007/978-3-642-14423-3\_2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ManulisSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/CatuognoLMSW09,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  editor       = {Adam Moskowitz},
  title        = {Transparent Mobile Storage Protection in Trusted Virtual Domains},
  booktitle    = {Proceedings of the 23rd Large Installation System Administration Conference,
                  November 1-6, 2009, Baltimore, MD, {USA}},
  pages        = {159--172},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/lisa09/tech/full\_papers/catuogno.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/CatuognoLMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Manulis09,
  author       = {Mark Manulis},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Securing Remote Access Inside Wireless Mesh Networks},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_24},
  doi          = {10.1007/978-3-642-10838-9\_24},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Manulis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBNM09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  title        = {Generic One Round Group Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DentFMSS09,
  author       = {Alexander W. Dent and
                  Marc Fischlin and
                  Mark Manulis and
                  Martijn Stam and
                  Dominique Schr{\"{o}}der},
  title        = {Confidential Signatures and Deterministic Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DentFMSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BressonM08,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  title        = {Contributory group key exchange in the presence of malicious participants},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {85--93},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070113},
  doi          = {10.1049/IET-IFS:20070113},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BressonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BressonM08,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  title        = {Securing group key exchange against strong corruptions and key registration
                  attacks},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {91--107},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021083},
  doi          = {10.1504/IJACT.2008.021083},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BressonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08,
  author       = {Romain Robert and
                  Mark Manulis and
                  Florence De Villenfagne and
                  Damien Leroy and
                  Julien Jost and
                  Fran{\c{c}}ois Koeune and
                  Caroline Ker and
                  Jean{-}Marc Dinant and
                  Yves Poullet and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {WiFi Roaming: Legal Implications and Security Constraints},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {205--241},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean016},
  doi          = {10.1093/IJLIT/EAN016},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GajekMS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong
                  Locked Same Origin Policy},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {6--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_2},
  doi          = {10.1007/978-3-540-70500-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GajekMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BressonM08,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Securing group key exchange against strong corruptions},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {249--260},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368347},
  doi          = {10.1145/1368310.1368347},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BressonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GajekMSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Provably secure browser-based user-aware mutual authentication over
                  {TLS}},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {300--311},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368354},
  doi          = {10.1145/1368310.1368354},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GajekMSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GajekJMS08,
  author       = {Sebastian Gajek and
                  Tibor Jager and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A Browser-Based Kerberos Authentication Scheme},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_8},
  doi          = {10.1007/978-3-540-88313-5\_8},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GajekJMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ArmknechtELMS08,
  author       = {Frederik Armknecht and
                  Alberto N. Escalante and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Secure Multi-Coupons for Federated Environments: Privacy-Preserving
                  and Customer-Friendly},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_3},
  doi          = {10.1007/978-3-540-79104-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ArmknechtELMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenLMS08,
  author       = {Liqun Chen and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Property-Based Attestation without a Trusted Third Party},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_3},
  doi          = {10.1007/978-3-540-85886-7\_3},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChenLMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/GajekMPSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Olivier Pereira and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Universally Composable Security Analysis of {TLS}},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_22},
  doi          = {10.1007/978-3-540-88733-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/GajekMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GajekMPSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Olivier Pereira and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Universally Composable Security Analysis of {TLS} - Secure Sessions
                  with Handshake and Record Layer Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisLKBQ08,
  author       = {Mark Manulis and
                  Damien Leroy and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel
                  at Home},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Manulis2007,
  author       = {Mark Manulis},
  title        = {Provably secure group key exchange},
  school       = {Ruhr University Bochum},
  year         = {2007},
  url          = {https://d-nb.info/985305509},
  isbn         = {978-3-89966-275-7},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Manulis2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiaoM07,
  author       = {Lijun Liao and
                  Mark Manulis},
  title        = {Tree-based group key agreement framework for mobile ad-hoc networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {23},
  number       = {6},
  pages        = {787--803},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.future.2007.01.001},
  doi          = {10.1016/J.FUTURE.2007.01.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiaoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/BressonM07,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {Malicious Participants in Group Key Exchange: Key Control and Contributiveness
                  in the Shadow of Trust},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_41},
  doi          = {10.1007/978-3-540-73547-2\_41},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/BressonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenELMS07,
  author       = {Liqun Chen and
                  Alberto N. Escalante and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection
                  Against Splitting},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_4},
  doi          = {10.1007/978-3-540-77366-5\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChenELMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ManulisS07,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Provably Secure Framework for Information Aggregation in Sensor Networks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4705},
  pages        = {603--621},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74472-6\_49},
  doi          = {10.1007/978-3-540-74472-6\_49},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ManulisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BressonMS07,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_20},
  doi          = {10.1007/978-3-540-75651-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisS07,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {Provably Secure Framework for Information Aggregation is Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LiaoM06,
  author       = {Lijun Liao and
                  Mark Manulis},
  title        = {Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {5--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.336},
  doi          = {10.1109/AINA.2006.336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/LiaoM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ManulisS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  title        = {Property-Based Taming of Lying Mobile Nodes},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {476--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.276},
  doi          = {10.1109/AINA.2006.276},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ManulisS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Manulis06,
  author       = {Mark Manulis},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Democratic group signatures: on an example of joint ventures},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {365},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128882},
  doi          = {10.1145/1128817.1128882},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Manulis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ManulisSS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Linkable Democratic Group Signatures},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_18},
  doi          = {10.1007/11689522\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ManulisSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisSS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Linkable Democratic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonMS06,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manulis06,
  author       = {Mark Manulis},
  title        = {Survey on Security Requirements and Models for Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manulis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manulis06a,
  author       = {Mark Manulis},
  title        = {Security-Focused Survey on Group Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manulis06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/Manulis05,
  author       = {Mark Manulis},
  title        = {Key Agreement for Heterogeneous Mobile Ad-Hoc Groups},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {290--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.177},
  doi          = {10.1109/ICPADS.2005.177},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/Manulis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/Manulis05,
  author       = {Mark Manulis},
  title        = {Contributory group key agreement protocols, revisited for mobile ad-hoc
                  groups},
  booktitle    = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MAHSS.2005.1542876},
  doi          = {10.1109/MAHSS.2005.1542876},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/Manulis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manulis05,
  author       = {Mark Manulis},
  title        = {Democratic Group Signatures on Example of Joint Ventures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manulis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ManulisS04,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on
                  {IDH}},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_10},
  doi          = {10.1007/978-3-540-30496-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ManulisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics