|
Search the dblp DataBase
Mark Manulis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lijun Liao, Mark Manulis
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:5-9 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi
Property-Based Taming of Lying Mobile Nodes. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:476-480 [Conf]
- Mark Manulis
Democratic group signatures: on an example of joint ventures. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:365- [Conf]
- Mark Manulis, Jörg Schwenk
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:107-124 [Conf]
- Mark Manulis
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:290-294 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:187-201 [Conf]
- Emmanuel Bresson, Mark Manulis
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:395-409 [Conf]
- Mark Manulis, Jörg Schwenk
Provably Secure Framework for Information Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2007, pp:603-621 [Conf]
- Emmanuel Bresson, Mark Manulis, Jörg Schwenk
On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:292-307 [Conf]
- Lijun Liao, Mark Manulis
Tree-based group key agreement framework for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2007, v:23, n:6, pp:787-803 [Journal]
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. [Citation Graph (, )][DBLP]
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. [Citation Graph (, )][DBLP]
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP]
Privacy-Preserving Group Discovery with Linear Complexity. [Citation Graph (, )][DBLP]
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP]
Fully Robust Tree-Diffie-Hellman Group Key Exchange. [Citation Graph (, )][DBLP]
Securing group key exchange against strong corruptions. [Citation Graph (, )][DBLP]
Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]
Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP]
A Browser-Based Kerberos Authentication Scheme. [Citation Graph (, )][DBLP]
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]
Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]
Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]
Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]
Privacy-preserving admission to mobile peer-to-peer groups. [Citation Graph (, )][DBLP]
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. [Citation Graph (, )][DBLP]
Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP]
Securing Remote Access Inside Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]
Search in 0.030secs, Finished in 0.032secs
|