Mark Manulis
Orcid: 0000-0002-1512-9670Affiliations:
- Bundeswehr University Munich, Germany
- University of Surrey, UK (former)
- Darmstadt University of Technology, Germany (former)
According to our database1,
Mark Manulis
authored at least 111 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on surrey.ac.uk
-
on manulis.eu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability.
IACR Cryptol. ePrint Arch., 2024
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Trans. Serv. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
2020
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
2016
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
Proceedings of the Information Security - 19th International Conference, 2016
2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Int. J. Wirel. Mob. Comput., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
ACM Trans. Sens. Networks, 2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Int. J. Law Inf. Technol., 2008
Int. J. Appl. Cryptogr., 2008
IET Inf. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Computer Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Future Gener. Comput. Syst., 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004