Cyber security in new space M Manulis, CP Bridges, R Harrison, V Sekar, A Davis International Journal of Information Security 20 (3), 287-311, 2021 | 173 | 2021 |
Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 147 | 2010 |
Property-based attestation without a trusted third party L Chen, H Löhr, M Manulis, AR Sadeghi Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 105 | 2008 |
Universally composable security analysis of TLS S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008 | 101 | 2008 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 88 | 2008 |
Securing group key exchange against strong corruptions E Bresson, M Manulis Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 76 | 2008 |
Private discovery of common social contacts E De Cristofaro, M Manulis, B Poettering International journal of information security 12, 49-65, 2013 | 67 | 2013 |
Tree-based group key agreement framework for mobile ad-hoc networks L Liao, M Manulis Future Generation Computer Systems 23 (6), 787-803, 2007 | 67 | 2007 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of social network technologies and applications, 497-522, 2010 | 61 | 2010 |
Non-interactive and re-usable universally composable string commitments with adaptive security M Fischlin, B Libert, M Manulis International Conference on the Theory and Application of Cryptology and …, 2011 | 51 | 2011 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 48* | 2014 |
Democratic group signatures: on an example of joint ventures M Manulis Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 48 | 2006 |
Contributory group key agreement protocols, revisited for mobile ad-hoc groups M Manulis IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 48 | 2005 |
Security model and framework for information aggregation in sensor networks M Manulis, J Schwenk ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009 | 42* | 2009 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 40 | 2010 |
On security models and compilers for group key exchange protocols E Bresson, M Manulis, J Schwenk Advances in Information and Computer Security: Second International Workshop …, 2007 | 39 | 2007 |
Zero-knowledge password policy checks and verifier-based PAKE F Kiefer, M Manulis Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 37 | 2014 |
Group signatures: Authentication with privacy M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012 | 37 | 2012 |
Fully private revocable predicate encryption JM González-Nieto, M Manulis, D Sun Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 37 | 2012 |
Modeling leakage of ephemeral secrets in tripartite/group key exchange M Manulis, K Suzuki, B Ustaoglu IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 36 | 2013 |