Mark Manulis

According to our database1, Mark Manulis authored at least 91 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
pRate: Anonymous Star Rating with Rating Secrecy.
Proceedings of the Applied Cryptography and Network Security, 2019

Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Bootstrapping Online Trust: Timeline Activity Proofs.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Hierarchical Attribute-Based Signatures.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Password Authenticated Keyword Search.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

2016
Secure modular password authentication for the web using channel bindings.
Int. J. Inf. Sec., 2016

Universally Composable Two-Server PAKE.
Proceedings of the Information Security - 19th International Conference, 2016

Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
Proceedings of the Information Security - 19th International Conference, 2016

Blind Password Registration for Verifier-based PAKE.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2015
Oblivious PAKE: Efficient Handling of Password Trials.
Proceedings of the Information Security - 18th International Conference, 2015

Public Key Encryption with Distributed Keyword Search.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
Plaintext awareness in identity-based key encapsulation.
Int. J. Inf. Sec., 2014

Distributed Smooth Projective Hashing and its Application to Two-Server PAKE.
IACR Cryptology ePrint Archive, 2014

Secure Modular Password Authentication for the Web Using Channel Bindings.
Proceedings of the Security Standardisation Research - First International Conference, 2014

A Modular Framework for Multi-Factor Authentication and Key Exchange.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Rerandomizable Threshold Blind Signatures.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.
Proceedings of the Computer Security - ESORICS 2014, 2014

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Security and privacy for digital ecosystems.
Inf. Sec. Techn. Report, 2013

Oblivious PAKE and Efficient Handling of Password Trials.
IACR Cryptology ePrint Archive, 2013

Pseudorandom signatures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Plaintext Awareness in Identity-Based Key Encapsulation.
IACR Cryptology ePrint Archive, 2012

Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
IACR Cryptology ePrint Archive, 2012

Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).
Dagstuhl Reports, 2012

Publicly Verifiable Ciphertexts.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Forward-Secure Hierarchical Predicate Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Fully Private Revocable Predicate Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Modeling key compromise impersonation attacks on group key exchange protocols.
ACM Trans. Inf. Syst. Secur., 2011

SWISH: Secure WiFi sharing.
Computer Networks, 2011

Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

UPBA: User-Authenticated Property-Based Attestation.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Cryptographic Treatment of Private User Profiles.
Proceedings of the Financial Cryptography and Data Security, 2011

Practical affiliation-hiding authentication from improved polynomial interpolation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Group Signature with Constant Revocation Costs for Signers and Verifiers.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Private Discovery of Common Social Contacts.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Security and Privacy in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Key agreement for heterogeneous mobile ad-hoc groups.
IJWMC, 2010

Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Confidential Signatures and Deterministic Signcryption.
Proceedings of the Public Key Cryptography, 2010

Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Privacy-preserving admission to mobile peer-to-peer groups.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Proceedings of the Progress in Cryptology, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Privacy-Preserving Group Discovery with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security model and framework for information aggregation in sensor networks.
TOSN, 2009

User-aware provably secure protocols for browser-based mutual authentication.
IJACT, 2009

Securing Remote Access Inside Wireless Mesh Networks.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
Proceedings of the Information, Security and Cryptology, 2009

Generic One Round Group Key Exchange in the Standard Model.
Proceedings of the Information, Security and Cryptology, 2009

Authenticated wireless roaming via tunnels: making mobile guests feel at home.
Proceedings of the 2009 ACM Symposium on Information, 2009

Fully Robust Tree-Diffie-Hellman Group Key Exchange.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
WiFi Roaming: Legal Implications and Security Constraints.
I. J. Law and Information Technology, 2008

Securing group key exchange against strong corruptions and key registration attacks.
IJACT, 2008

Contributory group key exchange in the presence of malicious participants.
IET Information Security, 2008

Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptology ePrint Archive, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

A Browser-Based Kerberos Authentication Scheme.
Proceedings of the Computer Security, 2008

Provably secure browser-based user-aware mutual authentication over TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Securing group key exchange against strong corruptions.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Provably secure group key exchange.
PhD thesis, 2007

Provably Secure Framework for Information Aggregation is Sensor Networks.
IACR Cryptology ePrint Archive, 2007

On Security Models and Compilers for Group Key Exchange Protocols.
Proceedings of the Advances in Information and Computer Security, 2007

Provably Secure Framework for Information Aggregation in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Security-Focused Survey on Group Key Exchange Protocols.
IACR Cryptology ePrint Archive, 2006

Survey on Security Requirements and Models for Group Key Exchange.
IACR Cryptology ePrint Archive, 2006

Linkable Democratic Group Signatures.
Proceedings of the Information Security Practice and Experience, 2006

Democratic group signatures: on an example of joint ventures.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Property-Based Taming of Lying Mobile Nodes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Democratic Group Signatures on Example of Joint Ventures.
IACR Cryptology ePrint Archive, 2005

Contributory group key agreement protocols, revisited for mobile ad-hoc groups.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004


  Loading...