Pr. Mark Manulis

Disclaimer: This page refers to former member of the group. Validity or accuracy of the following information is thus not guaranteed in any way.

I left UCL Crypto Group in January 2009.
Homepage:http://www.manulis.eu

Seminars given

June 20, 2007 - Security-Enhancing Compilers for Group Key Exchange Protocols
by Pr. Mark Manulis

BibTeX - Manulis

Publications

Marc Fischlin, Benoit Libert, and Mark Manulis. Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security, In D.-H. Lee & X. Wang, editor(s), Asiacrypt 2011, Volume 7073 of Lecture Notes in Computer Science, pages 468-485, Spinger, December 2011, BibTeX

David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions, In D. Bernstein and T. Lange, editor(s), Progress in Cryptology - Africacrypt 2010, Volume 6055 of Lecture Notes in Computer Science (LNCS), pages 333-350, Springer, May 2010 BibTeX

Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, and Jean-Jacques Quisquater. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home, In R. Safavi-Naini and V. Varadharajan, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), March 2009, to appear BibTeX

Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, and Joerg Schwenk. Universally Composable Security Analysis of TLS, 2nd International Conference on Provable Security (ProvSec 2008), Volume 5324 of LNCS, pages 313-327, Springer, October 2008 PDF BibTeX

Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, and Jean-Jacques Quisquater. WiFi Roaming: Legal Implications and Security Constraints, In International Journal of Law and Information Technology, Volume 16-3, pages 205-241, October 2008 BibTeX

Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks, In International Journal of Applied Cryptography, Volume 1-2, pages 91-107, October 2008 BibTeX

Sebastian Gajek, Tibor Jager, Mark Manulis, and Joerg Schwenk. A Browser-Based Kerberos Authentication Scheme, 13th European Symposium on Research in Computer Security (ESORICS 2008), Volume 5283 of LNCS, pages 115-129, Springer, October 2008 BibTeX

Liqun Chen, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Property-Based Attestation without a Trusted Third Party, In T.-C. Wu et al., editor(s), 11th Information Security Conference (ISC 2008), Volume 5222 of Lecture Notes in Computer Science, pages 31-46, Springer-Verlag, September 2008 BibTeX

Emmanuel Bresson, and Mark Manulis. Contributory Group Key Exchange in the Presence of Malicious Participants, In IET Information Security, Volume 2-3, pages 85-93, September 2008 BibTeX

Sebastian Gajek, Mark Manulis, and Joerg Schwenk. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same-Origin Policy, In Y. Mu, W. Susilo, and J. Seberry, editor(s), 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Volume 5107 of Lecture Notes in Computer Science, pages 6-20, Springer, July 2008 BibTeX

Frederik Armknecht, Alberto Escalante, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly, In L. Chen, Y. Mu, and W. Susilo, editor(s), 4th Information Security Practice and Experience Conference (ISPEC 2008), Volume 4991 of Lecture Notes in Computer Science, pages 29-44, Springer, April 2008 BibTeX

Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, and Joerg Schwenk. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 300-311, ACM Press, March 2008 BibTeX

Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 249-260, ACM Press, March 2008 BibTeX

Emmanuel Bresson, Mark Manulis, and Joerg Schwenk. On Security Models and Compilers for Group Key Exchange Protocols, 2nd International Workshop on Security (IWSEC 2007), Volume 4752 of Lecture Notes in Computer Science, pages 292-307, Springer, October 2007 BibTeX

Mark Manulis, and Joerg Schwenk. Provably Secure Framework for Information Aggregation in Sensor Networks, Computational Science and Its Applications - ICCSA 2007, International Conference, Part I, Volume 4705 of Lecture Notes in Computer Science, pages 603-621, Springer, August 2007 BibTeX

Mark Manulis. Provably Secure Group Key Exchange, Christoph Paar, Ahmad-Reza Sadeghi, Joerg Schwenk ed., August 2007 BibTeX

Emmanuel Bresson, and Mark Manulis. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Volume 4610 of Lecture Notes in Computer Science, pages 395-409, Springer Verlag, July 2007 BibTeX

Mark Manulis, and Joerg Schwenk. Security Model and Framework for Information Aggregation in Sensor Networks, In ACM Transactions on Sensor Networks, To appear BibTeX

Copyright Notice

(click here to expand/retract)