


Остановите войну!
for scientists:


default search action
Mark Manulis
Person information

- affiliation: University of Surrey, UK
- affiliation: Darmstadt University of Technology, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c78]Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems. ACNS (1) 2023: 394-421 - [c77]Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. EuroS&P 2023: 928-941 - [e6]Shujun Li
, Mark Manulis
, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8 [contents] - [i40]Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. IACR Cryptol. ePrint Arch. 2023: 419 (2023) - [i39]Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 456 (2023) - 2022
- [j20]Yifan Yang
, Daniel Cooper, John P. Collomosse
, Constantin Catalin Dragan
, Mark Manulis
, Jamie Steane
, Arthi Manohar
, Jo Briggs
, Helen S. Jones
, Wendy Moncur
:
TAPESTRY: A De-Centralized Service for Trusted Interaction Online. IEEE Trans. Serv. Comput. 15(3): 1385-1398 (2022) - [c76]Daniel Gardham
, Mark Manulis
:
Revocable Hierarchical Attribute-Based Signatures from Lattices. ACNS 2022: 459-479 - [c75]M. Caballero, Dimitris Kavallieros, A. Spyros, A. Tavernarakisv, Athanasios Tziouvaras
, Stefano Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, Emmanouil Kafetzakis, T. Kasig, Vaios Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, Mark Manulis
, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, Spyros Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, Theodora Tsikrika, E. Venegas, Stefanos Vrochidis, D. Xydias:
ICT in Healthcare: the role of IoT and the SECANT solution. CSR 2022: 104-111 - [c74]Nick Frymann, Daniel Gardham, Mark Manulis
:
Unlinkable Delegation of WebAuthn Credentials. ESORICS (3) 2022: 125-144 - [i38]Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. IACR Cryptol. ePrint Arch. 2022: 303 (2022) - [i37]Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-based Signatures from Lattices. IACR Cryptol. ePrint Arch. 2022: 397 (2022) - 2021
- [j19]Mark Manulis
, Christopher P. Bridges, R. Harrison, Venkkatesh Sekar, Andy Davis:
Cyber security in New Space. Int. J. Inf. Sec. 20(3): 287-311 (2021) - [j18]Liqun Chen
, Kaibin Huang, Mark Manulis
, Venkkatesh Sekar:
Password-authenticated searchable encryption. Int. J. Inf. Sec. 20(5): 675-693 (2021) - 2020
- [c73]Daniel Gardham
, Mark Manulis, Constantin Catalin Dragan
:
Biometric-Authenticated Searchable Encryption. ACNS (2) 2020: 40-61 - [c72]Nick Frymann, Daniel Gardham
, Franziskus Kiefer, Emil Lundberg, Mark Manulis
, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. CCS 2020: 939-954 - [c71]Matthew Casey, Mark Manulis, Christopher J. P. Newton
, Robin Savage, Helen Treharne
:
An Interoperable Architecture for Usable Password-Less Authentication. ETAA@ESORICS 2020: 16-32 - [c70]Constantin Catalin Dragan
, Mark Manulis
:
KYChain: user-controlled KYC data sharing and certification. SAC 2020: 301-307 - [e5]Ioana Boureanu
, Constantin Catalin Dragan
, Mark Manulis
, Thanassis Giannetsos
, Christoforos Dadoyan
, Panagiotis Gouvas, Roger A. Hallman
, Shujun Li, Victor Chang, Frank Pallas
, Jörg Pohle, Angela M. Sasse
:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i36]Constantin Catalin Dragan, Mark Manulis:
KYChain: User-Controlled KYC Data Sharing and Certification. CoRR abs/2001.01659 (2020) - [i35]Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. IACR Cryptol. ePrint Arch. 2020: 17 (2020) - [i34]Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. IACR Cryptol. ePrint Arch. 2020: 1004 (2020)
2010 – 2019
- 2019
- [c69]Daniel Gardham
, Mark Manulis
:
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length. ACNS 2019: 89-109 - [c68]Jia Liu, Mark Manulis
:
pRate: Anonymous Star Rating with Rating Secrecy. ACNS 2019: 550-570 - [c67]Juan E. Rubio, Mark Manulis
, Cristina Alcaraz, Javier López:
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics. ESORICS (2) 2019: 263-280 - [i33]Yifan Yang, Daniel Cooper, John P. Collomosse, Constantin Catalin Dragan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen S. Jones, Wendy Moncur
:
TAPESTRY: A Blockchain based Service for Trusted Interaction Online. CoRR abs/1905.06186 (2019) - [i32]Nick Frymann, Mark Manulis:
Securing Fleets of Consumer Drones at Low Cost. CoRR abs/1912.05064 (2019) - [i31]Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. IACR Cryptol. ePrint Arch. 2019: 378 (2019) - [i30]Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length. IACR Cryptol. ePrint Arch. 2019: 382 (2019) - 2018
- [c66]Constantin Catalin Dragan
, Daniel Gardham
, Mark Manulis
:
Hierarchical Attribute-Based Signatures. CANS 2018: 213-234 - [c65]Constantin Catalin Dragan
, Mark Manulis
:
Bootstrapping Online Trust: Timeline Activity Proofs. DPM/CBT@ESORICS 2018: 242-259 - [e4]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [i29]Constantin Catalin Dragan, Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures. IACR Cryptol. ePrint Arch. 2018: 610 (2018) - 2017
- [c64]Kaibin Huang, Mark Manulis
, Liqun Chen
:
Password Authenticated Keyword Search. PAC 2017: 129-140 - 2016
- [j17]Mark Manulis
, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c63]Franziskus Kiefer, Mark Manulis
:
Blind Password Registration for Verifier-based PAKE. AsiaPKC@AsiaCCS 2016: 39-48 - [c62]Franziskus Kiefer, Mark Manulis
:
Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols. ISC 2016: 95-114 - [c61]Franziskus Kiefer, Mark Manulis
:
Universally Composable Two-Server PAKE. ISC 2016: 147-166 - [e3]Mark Manulis
, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8 [contents] - [i28]Franziskus Kiefer, Mark Manulis:
Blind Password Registration for Verifier-based PAKE. IACR Cryptol. ePrint Arch. 2016: 442 (2016) - [i27]Franziskus Kiefer, Mark Manulis:
Universally Composable Two-Server PAKE. IACR Cryptol. ePrint Arch. 2016: 520 (2016) - 2015
- [c60]Veronika Kuchta, Mark Manulis
:
Public Key Encryption with Distributed Keyword Search. INTRUST 2015: 62-83 - [c59]Franziskus Kiefer, Mark Manulis
:
Oblivious PAKE: Efficient Handling of Password Trials. ISC 2015: 191-208 - 2014
- [j16]Juan Manuel González Nieto, Mark Manulis
, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Comput. J. 57(4): 510-536 (2014) - [j15]Mark Manulis
, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c58]Franziskus Kiefer, Mark Manulis
:
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. ACNS 2014: 199-216 - [c57]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c56]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. CANS 2014: 321-336 - [c55]Franziskus Kiefer, Mark Manulis
:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. ESORICS (2) 2014: 295-312 - [c54]Veronika Kuchta, Mark Manulis
:
Rerandomizable Threshold Blind Signatures. INTRUST 2014: 70-89 - [c53]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [c52]Nils Fleischhacker
, Mark Manulis, Amir Azodi:
A Modular Framework for Multi-Factor Authentication and Key Exchange. SSR 2014: 190-214 - [i26]Franziskus Kiefer, Mark Manulis:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. IACR Cryptol. ePrint Arch. 2014: 242 (2014) - [i25]Franziskus Kiefer, Mark Manulis:
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE. IACR Cryptol. ePrint Arch. 2014: 350 (2014) - [i24]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation. IACR Cryptol. ePrint Arch. 2014: 382 (2014) - [i23]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptol. ePrint Arch. 2014: 731 (2014) - 2013
- [j14]Mark Manulis
, Koutarou Suzuki, Berkant Ustaoglu:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 101-110 (2013) - [j13]Emiliano De Cristofaro, Mark Manulis
, Bertram Poettering:
Private discovery of common social contacts. Int. J. Inf. Sec. 12(1): 49-65 (2013) - [j12]Ioannis G. Askoxylakis, Mark Manulis
, Joachim Posegga:
Security and privacy for digital ecosystems. Inf. Secur. Tech. Rep. 17(3): 45 (2013) - [j11]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [c51]Yang Wang, Mark Manulis
, Man Ho Au
, Willy Susilo
:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". ACISP 2013: 187-202 - [c50]Veronika Kuchta, Mark Manulis
:
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. CANS 2013: 251-270 - [c49]Nils Fleischhacker
, Felix Günther, Franziskus Kiefer, Mark Manulis
, Bertram Poettering:
Pseudorandom signatures. AsiaCCS 2013: 107-118 - [i22]Franziskus Kiefer, Mark Manulis:
Oblivious PAKE and Efficient Handling of Password Trials. IACR Cryptol. ePrint Arch. 2013: 127 (2013) - [i21]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". IACR Cryptol. ePrint Arch. 2013: 230 (2013) - 2012
- [c48]Stanislaus Stelle, Mark Manulis
, Matthias Hollick:
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. ARES 2012: 28-37 - [c47]Atsushi Fujioka, Mark Manulis
, Koutarou Suzuki, Berkant Ustaoglu
:
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. ACISP 2012: 15-28 - [c46]Juan Manuel González Nieto, Mark Manulis
, Dongdong Sun:
Fully Private Revocable Predicate Encryption. ACISP 2012: 350-363 - [c45]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Pairing 2012: 83-101 - [c44]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [e2]Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis:
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings. Springer 2012, ISBN 978-3-642-35403-8 [contents] - [e1]Marc Fischlin, Johannes Buchmann, Mark Manulis
:
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7293, Springer 2012, ISBN 978-3-642-30056-1 [contents] - [i20]Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright:
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports 2(9): 165-183 (2012) - [i19]Nils Fleischhacker, Mark Manulis, Amir Azodi:
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2012: 181 (2012) - [i18]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i17]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 402 (2012) - [i16]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 403 (2012) - [i15]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptol. ePrint Arch. 2012: 559 (2012) - 2011
- [j10]Damien Leroy, Gregory Detal, Julien Cathalo, Mark Manulis
, François Koeune, Olivier Bonaventure:
SWISH: Secure WiFi sharing. Comput. Networks 55(7): 1614-1630 (2011) - [j9]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
:
Modeling key compromise impersonation attacks on group key exchange protocols. ACM Trans. Inf. Syst. Secur. 14(4): 28:1-28:24 (2011) - [c43]Emiliano De Cristofaro, Mark Manulis
, Bertram Poettering:
Private Discovery of Common Social Contacts. ACNS 2011: 147-165 - [c42]Marc Fischlin, Benoît Libert, Mark Manulis
:
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. ASIACRYPT 2011: 468-485 - [c41]Chun-I Fan, Ruei-Hau Hsu, Mark Manulis
:
Group Signature with Constant Revocation Costs for Signers and Verifiers. CANS 2011: 214-233 - [c40]Mark Manulis
, Bertram Poettering:
Practical affiliation-hiding authentication from improved polynomial interpolation. AsiaCCS 2011: 286-295 - [c39]Felix Günther, Mark Manulis
, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. Financial Cryptography Workshops 2011: 40-54 - [c38]Mark Manulis
, Marion Steiner:
UPBA: User-Authenticated Property-Based Attestation. PST 2011: 112-119 - [c37]Mark Manulis
, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011: 85-99 - [c36]Felix Günther, Mark Manulis
, Thorsten Strufe:
Key management in distributed online social networks. WOWMOM 2011: 1-7 - [i14]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. IACR Cryptol. ePrint Arch. 2011: 26 (2011) - [i13]Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. IACR Cryptol. ePrint Arch. 2011: 64 (2011) - [i12]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom Signatures. IACR Cryptol. ePrint Arch. 2011: 673 (2011) - 2010
- [j8]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010) - [j7]Mark Manulis
, Ahmad-Reza Sadeghi:
Key agreement for heterogeneous mobile ad-hoc groups. Int. J. Wirel. Mob. Comput. 4(1): 17-30 (2010) - [c35]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis
, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c34]Mark Manulis
, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010: 402-419 - [c33]Mark Manulis
, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010: 420-437 - [c32]David Galindo
, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis
, Dominique Schröder
:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. AFRICACRYPT 2010: 333-350 - [c31]Michel Abdalla
, Céline Chevalier, Mark Manulis
, David Pointcheval
:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. AFRICACRYPT 2010: 351-368 - [c30]Delphine Christin
, Matthias Hollick, Mark Manulis
:
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks. ICCCN 2010: 1-6 - [c29]Mark Manulis
:
Privacy-preserving admission to mobile peer-to-peer groups. PerCom Workshops 2010: 111-116 - [c28]Mark Manulis
, Bertram Poettering, Gene Tsudik:
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Privacy Enhancing Technologies 2010: 149-165 - [c27]Alexander W. Dent, Marc Fischlin, Mark Manulis
, Martijn Stam, Dominique Schröder
:
Confidential Signatures and Deterministic Signcryption. Public Key Cryptography 2010: 462-479 - [p1]Leucio Antonio Cutillo
, Mark Manulis, Thorsten Strufe:
Security and Privacy in Online Social Networks. Handbook of Social Network Technologies 2010: 497-522 - [i11]Mark Manulis, Bertram Poettering:
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. IACR Cryptol. ePrint Arch. 2010: 659 (2010)
2000 – 2009
- 2009
- [j6]Sebastian Gajek, Mark Manulis
, Jörg Schwenk:
User-aware provably secure protocols for browser-based mutual authentication. Int. J. Appl. Cryptogr. 1(4): 290-308 (2009) - [j5]Mark Manulis
, Jörg Schwenk:
Security model and framework for information aggregation in sensor networks. ACM Trans. Sens. Networks 5(2): 13:1-13:28 (2009) - [c26]Mark Manulis
:
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. ACNS 2009: 1-19 - [c25]Timo Brecher, Emmanuel Bresson, Mark Manulis
:
Fully Robust Tree-Diffie-Hellman Group Key Exchange. CANS 2009: 478-497 - [c24]Mark Manulis
, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - [c23]Damien Leroy, Mark Manulis
, Olivier Bonaventure:
Enhanced wireless roaming security using three-party authentication and tunnels. U-NET@CoNEXT 2009: 7-12 - [c22]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
:
Generic One Round Group Key Exchange in the Standard Model. ICISC 2009: 1-15 - [c21]Mark Manulis
, Koutarou Suzuki, Berkant Ustaoglu
:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. ICISC 2009: 16-33 - [c20]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - [c19]Mark Manulis
:
Securing Remote Access Inside Wireless Mesh Networks. WISA 2009: 324-338 - [i10]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 514 (2009) - [i9]Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder:
Confidential Signatures and Deterministic Signcryption. IACR Cryptol. ePrint Arch. 2009: 588 (2009) - 2008
- [j4]Emmanuel Bresson, Mark Manulis
:
Contributory group key exchange in the presence of malicious participants. IET Inf. Secur. 2(3): 85-93 (2008) - [j3]Emmanuel Bresson, Mark Manulis
:
Securing group key exchange against strong corruptions and key registration attacks. Int. J. Appl. Cryptogr. 1(2): 91-107 (2008) - [j2]Romain Robert, Mark Manulis
, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008)