Mark Manulis

According to our database1, Mark Manulis authored at least 95 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Biometric-Authenticated Searchable Encryption.
IACR Cryptol. ePrint Arch., 2020

KYChain: user-controlled KYC data sharing and certification.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
pRate: Anonymous Star Rating with Rating Secrecy.
IACR Cryptol. ePrint Arch., 2019

Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length.
IACR Cryptol. ePrint Arch., 2019

Securing Fleets of Consumer Drones at Low Cost.
CoRR, 2019

TAPESTRY: A Blockchain based Service for Trusted Interaction Online.
CoRR, 2019

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Hierarchical Attribute-based Signatures.
IACR Cryptol. ePrint Arch., 2018

Bootstrapping Online Trust: Timeline Activity Proofs.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Password Authenticated Keyword Search.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

2016
Secure modular password authentication for the web using channel bindings.
Int. J. Inf. Sec., 2016

Universally Composable Two-Server PAKE.
IACR Cryptol. ePrint Arch., 2016

Blind Password Registration for Verifier-based PAKE.
IACR Cryptol. ePrint Arch., 2016

Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Oblivious PAKE: Efficient Handling of Password Trials.
Proceedings of the Information Security - 18th International Conference, 2015

Public Key Encryption with Distributed Keyword Search.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
Plaintext awareness in identity-based key encapsulation.
Int. J. Inf. Sec., 2014

Secure modular password authentication for the web using channel bindings.
IACR Cryptol. ePrint Arch., 2014

Distributed Smooth Projective Hashing and its Application to Two-Server PAKE.
IACR Cryptol. ePrint Arch., 2014

Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.
IACR Cryptol. ePrint Arch., 2014

Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptol. ePrint Arch., 2014

A Modular Framework for Multi-Factor Authentication and Key Exchange.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Rerandomizable Threshold Blind Signatures.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Security and privacy for digital ecosystems.
Inf. Secur. Tech. Rep., 2013

Private discovery of common social contacts.
Int. J. Inf. Sec., 2013

Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptol. ePrint Arch., 2013

Oblivious PAKE and Efficient Handling of Password Trials.
IACR Cryptol. ePrint Arch., 2013

Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Fully Private Revocable Predicate Encryption.
IACR Cryptol. ePrint Arch., 2012

Forward-Secure Hierarchical Predicate Encryption.
IACR Cryptol. ePrint Arch., 2012

Publicly Verifiable Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2012

Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).
Dagstuhl Reports, 2012

Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Modeling key compromise impersonation attacks on group key exchange protocols.
ACM Trans. Inf. Syst. Secur., 2011

Cryptographic Treatment of Private User Profiles.
IACR Cryptol. ePrint Arch., 2011

Pseudorandom Signatures.
IACR Cryptol. ePrint Arch., 2011

SWISH: Secure WiFi sharing.
Comput. Networks, 2011

Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

UPBA: User-Authenticated Property-Based Attestation.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Group Signature with Constant Revocation Costs for Signers and Verifiers.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Security and Privacy in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Key agreement for heterogeneous mobile ad-hoc groups.
Int. J. Wirel. Mob. Comput., 2010

Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
IACR Cryptol. ePrint Arch., 2010

Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Privacy-preserving admission to mobile peer-to-peer groups.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Proceedings of the Progress in Cryptology, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Privacy-Preserving Group Discovery with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security model and framework for information aggregation in sensor networks.
ACM Trans. Sens. Networks, 2009

User-aware provably secure protocols for browser-based mutual authentication.
IJACT, 2009

Generic One Round Group Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2009

Confidential Signatures and Deterministic Signcryption.
IACR Cryptol. ePrint Arch., 2009

Securing Remote Access Inside Wireless Mesh Networks.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Fully Robust Tree-Diffie-Hellman Group Key Exchange.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
WiFi Roaming: Legal Implications and Security Constraints.
I. J. Law and Information Technology, 2008

Securing group key exchange against strong corruptions and key registration attacks.
IJACT, 2008

Contributory group key exchange in the presence of malicious participants.
IET Information Security, 2008

Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
IACR Cryptol. ePrint Arch., 2008

Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

A Browser-Based Kerberos Authentication Scheme.
Proceedings of the Computer Security, 2008

Provably secure browser-based user-aware mutual authentication over TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Securing group key exchange against strong corruptions.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Provably secure group key exchange.
PhD thesis, 2007

Provably Secure Framework for Information Aggregation is Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

Tree-based group key agreement framework for mobile ad-hoc networks.
Future Gener. Comput. Syst., 2007

Provably Secure Framework for Information Aggregation in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Linkable Democratic Group Signatures.
IACR Cryptol. ePrint Arch., 2006

Security-Focused Survey on Group Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2006

Survey on Security Requirements and Models for Group Key Exchange.
IACR Cryptol. ePrint Arch., 2006

On Security Models and Compilers for Group Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2006

Democratic group signatures: on an example of joint ventures.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Property-Based Taming of Lying Mobile Nodes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Democratic Group Signatures on Example of Joint Ventures.
IACR Cryptol. ePrint Arch., 2005

Contributory group key agreement protocols, revisited for mobile ad-hoc groups.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004


  Loading...