Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 142 | 2010 |
Property-based attestation without a trusted third party L Chen, H Löhr, M Manulis, AR Sadeghi ISC 5222, 31-46, 2008 | 99 | 2008 |
Universally Composable Security Analysis of TLS. S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk ProvSec 5324, 313-327, 2008 | 93* | 2008 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 80 | 2008 |
Securing group key exchange against strong corruptions E Bresson, M Manulis Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 72 | 2008 |
Cyber security in new space M Manulis, CP Bridges, R Harrison, V Sekar, A Davis International Journal of Information Security 20 (3), 287-311, 2021 | 69 | 2021 |
Private discovery of common social contacts E De Cristofaro, M Manulis, B Poettering International journal of information security 12, 49-65, 2013 | 67 | 2013 |
Tree-based group key agreement framework for mobile ad-hoc networks L Liao, M Manulis Future Generation Computer Systems 23 (6), 787-803, 2007 | 63 | 2007 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of social network technologies and applications, 497-522, 2010 | 54 | 2010 |
Non-interactive and re-usable universally composable string commitments with adaptive security M Fischlin, B Libert, M Manulis Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 49 | 2011 |
Contributory group key agreement protocols, revisited for mobile ad-hoc groups M Manulis IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 48 | 2005 |
Democratic group signatures: on an example of joint ventures M Manulis Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 46 | 2006 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 45* | 2014 |
Security model and framework for information aggregation in sensor networks M Manulis, J Schwenk ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009 | 41* | 2009 |
On security models and compilers for group key exchange protocols E Bresson, M Manulis, J Schwenk Advances in Information and Computer Security: Second International Workshop …, 2007 | 39 | 2007 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 37 | 2010 |
Fully private revocable predicate encryption JM González-Nieto, M Manulis, D Sun Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 36 | 2012 |
A privacy-protecting multi-coupon scheme with stronger protection against splitting L Chen, AN Escalante B, H Löhr, M Manulis, AR Sadeghi Financial Cryptography and Data Security: 11th International Conference, FC …, 2007 | 35 | 2007 |
Group signatures: Authentication with privacy M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012 | 34 | 2012 |
Survey on security requirements and models for group key exchange M Manulis Cryptology ePrint Archive, 2006 | 34 | 2006 |