University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Manulis, M"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 101.

Article

Manulis, Mark, Stebila, D, Kiefer, F and Denham, N (2016) Secure modular password authentication for the web using channel bindings International Journal of Information Security, 16 (6). pp. 597-620.

Nieto, JMG, Manulis, M and Sun, D (2014) Forward-Secure Hierarchical Predicate Encryption The Computer Journal, 57. pp. 510-536.

Manulis, M, Poettering, B and Stebila, D (2014) Plaintext Awareness in Identity-Based Key Encapsulation International Journal of Information Security, 13. pp. 25-49.

Cristofaro, ED, Manulis, Mark and Poettering, B (2013) Private Discovery of Common Social Contacts International Journal of Information Security, 12 (1). pp. 49-65.

Manulis, M, Suzuki, K and Ustaoglu, B (2013) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange IEICE Transactions, 96-A, 1. pp. 101-110.

Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2013) Publicly Verifiable Ciphertexts Journal of Computer Security, 21. pp. 749-778.

Wang, Y, Manulis, M, Au, MH and Susilo, W (2013) Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". IACR Cryptology ePrint Archive, 2013. p. 230.

Nieto, JMG, Manulis, M and Sun, D (2012) Forward-Secure Hierarchical Predicate Encryption. IACR Cryptology ePrint Archive, 2012. p. 402.

Nieto, JMG, Manulis, M and Sun, D (2012) Fully Private Revocable Predicate Encryption. IACR Cryptology ePrint Archive, 2012. p. 403.

Fleischhacker, N, Manulis, M and Azodi, A (2012) Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange. IACR Cryptology ePrint Archive, 2012. p. 181.

Manulis, M, Poettering, B and Stebila, D (2012) Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptology ePrint Archive, 2012. p. 559.

Camenisch, J, Manulis, M, Tsudik, G and Wright, RN (2012) Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports, 2, 9. pp. 165-183.

Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2012) Publicly Verifiable Ciphertexts. IACR Cryptology ePrint Archive, 2012. p. 357.

Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2011) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols ACM Transactions on Information and Systems Security (TISSEC), 14 (4), 28.

Cristofaro, ED, Manulis, M and Poettering, B (2011) Private Discovery of Common Social Contacts. IACR Cryptology ePrint Archive, 2011. p. 26.

Fleischhacker, N, Günther, F, Kiefer, F, Manulis, M and Poettering, B (2011) Pseudorandom Signatures. IACR Cryptology ePrint Archive, 2011. p. 673.

Leroy, D, Detal, G, Cathalo, J, Manulis, M, Koeune, F and Bonaventure, O (2011) SWISH: Secure WiFi sharing Computer Networks, 55 (7). pp. 1614-1630.

Manulis, M and Sadeghi, A-R (2010) Key Agreement for Heterogeneous Mobile Ad-Hoc Groups International Journal of Wireless and Mobile Computing (IJWMC), 4 (1). pp. 17-30.

Manulis, M and Poettering, B (2010) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. IACR Cryptology ePrint Archive, 2010. p. 659.

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R, Stüble, C and Winandy, M (2010) Trusted Virtual Domains: Color Your Network Datenschutz und Datensicherheit (DuD), 34 (5). pp. 289-294.

Dent, AW, Fischlin, M, Manulis, M, Stam, M and Schröder, D (2009) Confidential Signatures and Deterministic Signcryption. IACR Cryptology ePrint Archive, 2009. p. 588.

Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2009) Generic One Round Group Key Exchange in the Standard Model. IACR Cryptology ePrint Archive, 2009. p. 514.

Manulis, M and Schwenk, JO (2009) Security Model and Framework for Information Aggregation in Sensor Networks ACM Transactions on Sensor Networks (TOSN), 5 (2), 13.

Gajek, S, Manulis, M and Schwenk, J (2009) User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication International Journal of Applied Cryptography (IJACT), 1 (4). pp. 290-308.

Manulis, M, Leroy, D, Koeune, F, Bonaventure, O and Quisquater, J-J (2008) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptology ePrint Archive, 2008. p. 382.

Bresson, E and Manulis, M (2008) Contributory Group Key Exchange in the Presence of Malicious Participants IET Information Security, 2 (3). pp. 85-93.

Bresson, E and Manulis, M (2008) Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks International Journal of Applied Cryptography (IJACT), 1 (2). pp. 91-107.

Gajek, S, Manulis, M, Pereira, O, Sadeghi, A-R and Schwenk, J (2008) Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptology ePrint Archive, 2008. p. 251.

Robert, R, Manulis, M, Villenfagne, FD, Leroy, D, Jost, J, Koeune, F, Ker, C, Dinant, J-M, Poullet, Y, Bonaventure, O and Quisquater, J-J (2008) WiFi Roaming: Legal Implications and Security Constraints International Journal of Law and Information Technology, 16 (3). pp. 205-241.

Liao, L and Manulis, M (2007) Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks Future Generation Computer Systems (FGCS), 23, 6. pp. 787-803.

Manulis, M and Schwenk, J (2007) Provably Secure Framework for Information Aggregation is Sensor Networks. IACR Cryptology ePrint Archive, 2007. p. 283.

Manulis, M, Sadeghi, A-R and Schwenk, J (2006) Linkable Democratic Group Signatures. IACR Cryptology ePrint Archive, 2006. p. 40.

Bresson, E, Manulis, M and Schwenk, J (2006) On Security Models and Compilers for Group Key Exchange Protocols. IACR Cryptology ePrint Archive, 2006. p. 385.

Manulis, M (2005) Democratic Group Signatures on Example of Joint Ventures. IACR Cryptology ePrint Archive, 2005. p. 446.

Book Section

Cutillo, LA, Manulis, M and Strufe, T (2010) Security and Privacy in Online Social Networks In: Handbook of Social Network Technologies and Applications. Springer-Verlag New York Inc. ISBN 1441971416

Liao, L, Manulis, M and Schwenk, J (2008) Securing Email Communication with XML Technology In: Handbook of Research on Information Security and Assurance. IGI Global, pp. 202-217. ISBN 9781599048550

Report

Manulis, M (2008) Survey on Security Requirements and Models for Group Key Exchange [Report]

Manulis, M (2006) Security-Focused Survey on Group Key Exchange Protocols [Report]

Conference or Workshop Item

Kiefer, F and Manulis, Mark (2016) Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols In: The 19th Information Security Conference, 2016-09-07 - 2016-09-09, Honolulu, HI, USA.

Kiefer, F and Manulis, Mark (2016) Universally Composable Two-Server PAKE In: 19th Information Security Conference (ISC), 2016-09-07 - 2016-09-09, Honolulu, HI, USA.

Kuchta, V and Manulis, M (2014) Rerandomizable Threshold Blind Signatures In: 6th International Conference on Trustworthy Systems (InTrust 2014), 2014-12-16 - ?.

Kiefer, F and Manulis, M (2014) Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014), 2014-06-10 - 2014-06-13, Lausanne, Switzerland..

Radke, K, Boyd, C, Nieto, JG, Manulis, M and Stebila, D (2014) Formalising Human Recognition: A Fundamental Building Block for Security Proofs

Fleischhacker, N, Manulis, M and Azodi, A (2014) A Modular Framework for Multi-Factor Authentication and Key Exchange

Günther, F, Manulis, M and Peter, A (2014) Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation In: 13th International Conference, CANS 2014, 2014-10-22 - 2014-10-24, Heraklion, Crete, Greece.

Kiefer, F and Manulis, M (2014) Zero-Knowledge Password Policy Checks and Verifier-Based PAKE In: 19th European Symposium on Research in Computer Security, 2014-09-07 - 2014-09-11, Wroclaw, Poland.

Fleischhacker, N, Günther, F, Kiefer, F, Manulis, M and Poettering, B (2013) Pseudorandom Signatures

Wang, Y, Manulis, M, Au, MH and Susilo, W (2013) Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”

Kuchta, V and Manulis, M (2013) Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions

Nieto, JMG, Manulis, M and Sun, D (2012) Forward-Secure Hierarchical Predicate Encryption.

Nieto, JMG, Manulis, M and Sun, D (2012) Fully Private Revocable Predicate Encryption In: 17th Australasian Conference, ACISP 2012, 2012-07-09 - 2012-07-11, Wollongong, NSW, Australia.

Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2012) Publicly Verifiable Ciphertexts In: 8th International Conference, SCN 2012, 2012-09-05 - 2012-09-07, Amalfi, Italy.

Fujioka, A, Manulis, M, Suzuki, K and Ustaoglu, B (2012) Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange

Stelle, S, Manulis, M and Hollick, M (2012) Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach In: ARES 2012, 2012-08-20 - 2012-08-24, Prague.

Manulis, M and Steiner, M (2011) UPBA: User-Authenticated Property-Based Attestation In: 9th PST 2011, 2011-07-19 - 2011-07-21, Montreal, Canada.

Manulis, M and Poettering, B (2011) Affiliation-Hiding Authentication with Minimal Bandwidth Consumption In: 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011), 2011-06-01 - ?.

Günther, F, Manulis, M and Strufe, T (2011) Cryptographic Treatment of Private User Profiles In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, 2011-02-28 - 2011-03-04, St Lucia.

Manulis, M and Poettering, B (2011) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation In: 6th ACM Symposium on Information, Computer and Communications Security, 2011-03-22 - 2011-03-24, Hong Kong.

Cristofaro, ED, Manulis, Mark and Poettering, B (2011) Private Discovery of Common Social Contacts In: 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), 2011-06-07 - 2011-06-10, Nerja, Spain.

Dent, AW, Fischlin, M, Manulis, M, Stam, M and Schröder, D (2010) Confidential Signatures and Deterministic Signcryption

Abdalla, M, Chevalier, C, Manulis, M and Pointcheval, D (2010) Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys In: Third International Conference on Cryptology in Africa AFRICACRYPT 2010, 2010-05-03 - 2010-05-06, Stellenbosch, South Africa.

Galindo, D, Libert, B, Fischlin, M, Fuchsbauer, G, Lehmann, A, Manulis, M and Schröder, D (2010) Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions

Manulis, M, Poettering, B and Tsudik, G (2010) Affiliation-Hiding Key Exchange with Untrusted Group Authorities

Manulis, M (2010) Privacy-Preserving Admission to Mobile Peer-to-Peer Groups

Manulis, M, Pinkas, B and Poettering, B (2010) Privacy-Preserving Group Discovery with Linear Complexity

Brzuska, C, Busch, H, Dagdelen, Ö, Fischlin, M, Franz, M, Katzenbeisser, S, Manulis, M, Onete, C, Peter, A, Poettering, B and Schröder, D (2010) Redactable Signatures for Tree-Structured Data: Definitions and Constructions

Christin, D, Hollick, M and Manulis, M (2010) Security and Privacy Objectives for Sensing Applications in Wireless Community Networks

Manulis, M, Poettering, B and Tsudik, G (2010) Taming Big Brother Ambitions: More Privacy for Secret Handshakes

Bresson, E, Brecher, T and Manulis, M (2009) Fully Robust Tree-Diffie-Hellman Group Key Exchange In: Cryptology and Network Security, 8th International Conference, 2009-12-12 - 2009-12-14, Kanazawa, Ishikawa, Japan.

Manulis, M (2009) Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys In: Applied Cryptography and Network Security: 7th International Conference, 2009-06-02 - 2009-06-05, Paris-Rocquencourt, France.

Manulis, M, Leroy, D, Koeune, F, Bonaventure, O and Quisquater, J-J (2009) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 2009-03-10 - 2009-03-12, Sydney, Australia.

Leroy, D, Manulis, M and Bonaventure, O (2009) Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels

Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2009) Generic One Round Group Key Exchange in the Standard Model

Manulis, M, Suzuki, K and Ustaoglu, B (2009) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange In: 12th International Conference on Information, Security, and Cryptology (ICISC 2009), 2009-12-02 - 2009-12-04, Seoul, Korea.

Manulis, M (2009) Securing Remote Access Inside Wireless Mesh Networks In: 10th International Workshop, WISA 2009, 2009-08-25 - 2009-08-27, Busan, Korea.

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R and Winandy, M (2009) Transparent Mobile Storage Protection in Trusted Virtual Domains In: 23rd Large Installation System Administration Conference, 2009-11-01 - 2009-11-06, Baltimore, MD.

Gajek, S, Jager, T, Manulis, M and Schwenk, J (2008) A Browser-Based Kerberos Authentication Scheme

Gajek, S, Manulis, M and Schwenk, J (2008) Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy In: 13th Australasian Conference, ACISP 2008, 2008-07-07 - 2008-07-09, Wollongong, Australia.

Chen, L, Escalante, AN, Löhr, H, Manulis, M and Sadeghi, A-R (2008) A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Chen, L, Löhr, H, Manulis, M and Sadeghi, A-R (2008) Property-Based Attestation without a Trusted Third Party

Gajek, S, Manulis, M, Sadeghi, A-R and Schwenk, J (2008) Provably Secure Browser-Based User-Aware Mutual Authentication over TLS In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Armknecht, F, Escalante, AN, Löhr, H, Manulis, M and Sadeghi, A-R (2008) Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Bresson, E and Manulis, M (2008) Securing Group Key Exchange against Strong Corruptions In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Gajek, S, Manulis, M, Pereira, O, Sadeghi, A-R and Schwenk, J (2008) Universally Composable Security Analysis of TLS.

Bresson, E, Manulis, M and Schwenk, JO (2007) On Security Models and Compilers for Group Key Exchange Protocols In: Advances in Information and Computer Security, 2nd Intl. Workshop on Security, 2007-10-29 - 2007-10-31, Nara, Japan.

Manulis, M and Schwenk, JO (2007) Provably Secure Framework for Information Aggregation in Sensor Networks

Bresson, E and Manulis, M (2007) Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust In: 4th International Conference, ATC 2007, 2007-07-11 - 2007-07-13, Hong Kong, China.

Manulis, M, Sadeghi, A-R and Schwenk, J (2006) Linkable Democratic Group Signatures

Manulis, M (2006) Democratic Group Signatures - On an Example of Joint Ventures In: 2006 ACM Symposium on Information, computer and communications security, 2006-03-21 - 2006-03-23, Taipei, Taiwan.

Manulis, M and Sadeghi, A-R (2006) Property-Based Taming of Lying Mobile Nodes

Liao, L and Manulis, M (2006) Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks

Manulis, M (2005) Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

Manulis, M (2005) Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

Manulis, M and Schwenk, J (2004) Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH

Fan, CI, Hsu, RH and Manulis, M Group Signature with Constant Revocation Costs for Signers and Verifiers In: 10th CANS 2011, 2011-12-10 - 2009-12-12, Sanya, China.

Günther, F, Manulis, M and Strufe, T Key Management in Distributed Online Social Networks In: 12th IEEE WOWMOM 2011, 2011-06-20 - 2011-06-24, Tuscany, Italy.

Fischlin, M, Libert, B and Manulis, M Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security In: 17th International Conference on the Theory and Application of Cryptology and Information Security, 2011-12-04 - 2011-12-08, Seoul, South Korea.

Book

Pieprzyk, J, Sadeghi, AR and Manulis, M (2012) Cryptology and Network Security — CANS 2012 Lecture Notes in Computer Science, 7712 . UNSPECIFIED. ISBN 978-3-642-35403-8

Fischlin, M, Buchmann, J and Manulis, M (2012) Public Key Cryptography — PKC 2012 Lecture Notes in Computer Science, 7293 . Springer-Verlag. ISBN 978-3-642-30056-1

Manulis, M (2007) Provably Secure Group Key Exchange IT Security, 5 . Europäischer Universitätsverlag, Berlin, Bochum, Dülmen, London, Paris. ISBN 978-3-89966-275-7

Patent

UNSPECIFIED Method, Authentication Server and Service Server for Authenticating a Client .

This list was generated on Sat Sep 23 07:39:22 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800