Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... International Conference on Applied Cryptography and Network Security, 87-104, 2010 | 133 | 2010 |
Property-based attestation without a trusted third party L Chen, H Löhr, M Manulis, AR Sadeghi International Conference on Information Security, 31-46, 2008 | 99 | 2008 |
Universally composable security analysis of TLS S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk International Conference on Provable Security, 313-327, 2008 | 86 | 2008 |
Securing group key exchange against strong corruptions E Bresson, M Manulis Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 69 | 2008 |
Private discovery of common social contacts E De Cristofaro, M Manulis, B Poettering International Journal of Information Security 12 (1), 49-65, 2013 | 65 | 2013 |
Tree-based group key agreement framework for mobile ad-hoc networks L Liao, M Manulis Future Generation Computer Systems 23 (6), 787-803, 2007 | 62 | 2007 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of social network technologies and applications, 497-522, 2010 | 49 | 2010 |
Non-interactive and re-usable universally composable string commitments with adaptive security M Fischlin, B Libert, M Manulis International Conference on the Theory and Application of Cryptology and …, 2011 | 46 | 2011 |
Contributory group key agreement protocols, revisited for mobile ad-hoc groups M Manulis IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 46 | 2005 |
Democratic group signatures: on an example of joint ventures M Manulis Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 43 | 2006 |
Security model and framework for information aggregation in sensor networks M Manulis, J Schwenk ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009 | 41* | 2009 |
On security models and compilers for group key exchange protocols E Bresson, M Manulis, J Schwenk International Workshop on Security, 292-307, 2007 | 38 | 2007 |
A privacy-protecting multi-coupon scheme with stronger protection against splitting L Chen, AN Escalante B, H Löhr, M Manulis, AR Sadeghi International Conference on Financial Cryptography and Data Security, 29-44, 2007 | 38 | 2007 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi International Conference on Research in Security Standardisation, 190-214, 2014 | 35* | 2014 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis International Conference on Information Security and Cryptology, 1-15, 2009 | 34 | 2009 |
Fully private revocable predicate encryption JM González-Nieto, M Manulis, D Sun Australasian Conference on Information Security and Privacy, 350-363, 2012 | 33 | 2012 |
Survey on security requirements and models for group key exchange M Manulis Cryptology ePrint Archive, 2006 | 33 | 2006 |
Malicious participants in group key exchange: key control and contributiveness in the shadow of trust E Bresson, M Manulis International Conference on Autonomic and Trusted Computing, 395-409, 2007 | 32 | 2007 |
Public-key encryption with non-interactive opening: New constructions and stronger definitions D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ... International Conference on Cryptology in Africa, 333-350, 2010 | 31 | 2010 |
Flexible group key exchange with on-demand computation of subgroup keys M Abdalla, C Chevalier, M Manulis, D Pointcheval International Conference on Cryptology in Africa, 351-368, 2010 | 30 | 2010 |