Cyber security in new space M Manulis, CP Bridges, R Harrison, V Sekar, A Davis International Journal of Information Security 20 (3), 287-311, 2021 | 182 | 2021 |
Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 155 | 2010 |
Property-based attestation without a trusted third party L Chen, H Löhr, M Manulis, AR Sadeghi Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 108 | 2008 |
Universally composable security analysis of TLS S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008 | 100 | 2008 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 85 | 2008 |
Securing group key exchange against strong corruptions E Bresson, M Manulis Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 77 | 2008 |
Tree-based group key agreement framework for mobile ad-hoc networks L Liao, M Manulis Future Generation Computer Systems 23 (6), 787-803, 2007 | 68 | 2007 |
Private discovery of common social contacts E De Cristofaro, M Manulis, B Poettering International journal of information security 12, 49-65, 2013 | 67 | 2013 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of Social Network Technologies and Applications, 497-522, 2010 | 64 | 2010 |
Non-interactive and re-usable universally composable string commitments with adaptive security M Fischlin, B Libert, M Manulis International Conference on the Theory and Application of Cryptology and …, 2011 | 51 | 2011 |
Contributory group key agreement protocols, revisited for mobile ad-hoc groups M Manulis IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 49 | 2005 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 47* | 2014 |
Democratic group signatures: on an example of joint ventures M Manulis Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 44 | 2006 |
Security model and framework for information aggregation in sensor networks M Manulis, J Schwenk ACM Transactions on Sensor Networks (TOSN) 5 (2), 1-28, 2009 | 42* | 2009 |
On security models and compilers for group key exchange protocols E Bresson, M Manulis, J Schwenk Advances in Information and Computer Security: Second International Workshop …, 2007 | 41 | 2007 |
Asynchronous remote key generation: an analysis of Yubico's proposal for W3C WebAuthn N Frymann, D Gardham, F Kiefer, E Lundberg, M Manulis, D Nilsson Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 40 | 2020 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 40 | 2010 |
Group signatures: Authentication with privacy M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012 | 37 | 2012 |
Linkable democratic group signatures M Manulis, AR Sadeghi, J Schwenk Information Security Practice and Experience: Second International …, 2006 | 37 | 2006 |
Modeling leakage of ephemeral secrets in tripartite/group key exchange M Manulis, K Suzuki, B Ustaoglu IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 36 | 2013 |