The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mark Manulis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lijun Liao, Mark Manulis
    Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:5-9 [Conf]
  2. Mark Manulis, Ahmad-Reza Sadeghi
    Property-Based Taming of Lying Mobile Nodes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:476-480 [Conf]
  3. Mark Manulis
    Democratic group signatures: on an example of joint ventures. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:365- [Conf]
  4. Mark Manulis, Jörg Schwenk
    Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:107-124 [Conf]
  5. Mark Manulis
    Key Agreement for Heterogeneous Mobile Ad-Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:290-294 [Conf]
  6. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
    Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:187-201 [Conf]
  7. Emmanuel Bresson, Mark Manulis
    Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:395-409 [Conf]
  8. Mark Manulis, Jörg Schwenk
    Provably Secure Framework for Information Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:603-621 [Conf]
  9. Emmanuel Bresson, Mark Manulis, Jörg Schwenk
    On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:292-307 [Conf]
  10. Lijun Liao, Mark Manulis
    Tree-based group key agreement framework for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:6, pp:787-803 [Journal]

  11. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. [Citation Graph (, )][DBLP]


  12. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. [Citation Graph (, )][DBLP]


  13. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP]


  14. Privacy-Preserving Group Discovery with Linear Complexity. [Citation Graph (, )][DBLP]


  15. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP]


  16. Fully Robust Tree-Diffie-Hellman Group Key Exchange. [Citation Graph (, )][DBLP]


  17. Securing group key exchange against strong corruptions. [Citation Graph (, )][DBLP]


  18. Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]


  19. Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP]


  20. A Browser-Based Kerberos Authentication Scheme. [Citation Graph (, )][DBLP]


  21. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]


  22. Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  23. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]


  24. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]


  25. Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]


  26. Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]


  27. Privacy-preserving admission to mobile peer-to-peer groups. [Citation Graph (, )][DBLP]


  28. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. [Citation Graph (, )][DBLP]


  29. Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP]


  30. Securing Remote Access Inside Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  31. Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]


  32. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]


  33. Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]


Search in 0.030secs, Finished in 0.032secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002