<?xml version="1.0"?>
<dblpperson name="Mark Manulis" pid="62/484" n="163">
<person key="homepages/62/484" mdate="2025-06-07">
<author pid="62/484">Mark Manulis</author>
<note type="affiliation">Bundeswehr University Munich, Germany</note>
<note label="former" type="affiliation">University of Surrey, UK</note>
<note label="former" type="affiliation">Darmstadt University of Technology, Germany</note>
<url>http://www.surrey.ac.uk/cs/research/fms/people/mark_manulis/</url>
<url>http://www.crypo.informatik.tu-darmstadt.de/members/mark-manulis/</url>
<url>http://manulis.eu/</url>
<url>https://scholar.google.com/citations?user=MdmQAVkAAAAJ</url>
<url>https://dl.acm.org/profile/81329490503</url>
<url>https://zbmath.org/authors/?q=ai:manulis.mark</url>
<url>https://mathscinet.ams.org/mathscinet/MRAuthorID/867483</url>
<url>https://mathgenealogy.org/id.php?id=117316</url>
<url>https://orcid.org/0000-0002-1512-9670</url>
<url>https://www.wikidata.org/entity/Q57772791</url>
<url>https://id.loc.gov/authorities/names/nb2012014558</url>
<url>https://d-nb.info/gnd/142899755</url>
</person>
<r><proceedings key="conf/acns/2025w1" mdate="2025-10-30">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<title>Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part I</title>
<booktitle>ACNS Workshops (1)</booktitle>
<publisher>Springer</publisher>
<year>2026</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>15653</volume>
<isbn>978-3-032-01798-7</isbn>
<isbn>978-3-032-01799-4</isbn>
<ee>https://doi.org/10.1007/978-3-032-01799-4</ee>
<url>db/conf/acns/acns2025w1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/acns/2025w2" mdate="2025-11-08">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<title>Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part II</title>
<booktitle>ACNS Workshops (3)</booktitle>
<publisher>Springer</publisher>
<year>2026</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>15654</volume>
<isbn>978-3-032-01805-2</isbn>
<isbn>978-3-032-01806-9</isbn>
<ee>https://doi.org/10.1007/978-3-032-01806-9</ee>
<url>db/conf/acns/acns2025w2.html</url>
</proceedings>
</r>
<r><proceedings key="conf/acns/2025w3" mdate="2025-10-30">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<title>Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part III</title>
<booktitle>ACNS Workshops (3)</booktitle>
<publisher>Springer</publisher>
<year>2026</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>15655</volume>
<isbn>978-3-032-01822-9</isbn>
<isbn>978-3-032-01823-6</isbn>
<ee>https://doi.org/10.1007/978-3-032-01823-6</ee>
<url>db/conf/acns/acns2025w3.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ChenMWKNTKDGM26" mdate="2026-02-24">
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="92/7038">Long Meng</author>
<author pid="34/7650">Yalan Wang</author>
<author pid="253/1266">Nada El Kassem</author>
<author pid="121/5010">Chris J. P. Newton</author>
<author pid="188/7576">Yangguang Tian</author>
<author pid="275/3145">Jodie Knapp</author>
<author pid="77/7303">Constantin Catalin Dragan</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>FABS: Fast Attribute-Based Signatures.</title>
<year>2026</year>
<pages>22</pages>
<volume>2026</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2026/022</ee>
<url>db/journals/iacr/iacr2026.html#ChenMWKNTKDGM26</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><inproceedings key="conf/acns/ManulisN25" mdate="2025-07-04">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="348/3825">Hugo Nartz</author>
<title>Distributed Asynchronous Remote Key Generation.</title>
<pages>486-515</pages>
<year>2025</year>
<booktitle>ACNS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-95761-1_17</ee>
<crossref>conf/acns/2025-1</crossref>
<url>db/conf/acns/acns2025-1.html#ManulisN25</url>
<stream>streams/conf/acns</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/asiaccs/LiuM25" mdate="2025-10-14">
<author orcid="0000-0001-7094-9324" pid="49/1245-3">Jia Liu 0003</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.</title>
<pages>807-822</pages>
<year>2025</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3708821.3710835</ee>
<crossref>conf/asiaccs/2025</crossref>
<url>db/conf/asiaccs/asiaccs2025.html#LiuM25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/ChenMMTZ25" mdate="2025-12-25">
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="92/7038">Long Meng</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="188/7576">Yangguang Tian</author>
<author pid="31/3845">Yinghui Zhang</author>
<title>Attribute-Based Key Exchange with Optimal Efficiency.</title>
<pages>315-334</pages>
<year>2025</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-981-95-4434-9_15</ee>
<crossref>conf/cans/2025</crossref>
<url>db/conf/cans/cans2025.html#ChenMMTZ25</url>
<stream>streams/conf/cans</stream>
</inproceedings>
</r>
<r><article key="journals/cj/LiLMTY24" mdate="2025-12-24">
<author orcid="0000-0002-9351-2800" pid="84/3795-7">Nan Li 0007</author>
<author pid="15/2506">Yingjiu Li</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0002-6624-5380" pid="188/7576">Yangguang Tian</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<title>Practical and secure policy-based chameleon hash for redactable blockchains.</title>
<pages>3128-3139</pages>
<year>2024</year>
<volume>67</volume>
<journal>Comput. J.</journal>
<number>11</number>
<ee>https://doi.org/10.1093/comjnl/bxae075</ee>
<url>db/journals/cj/cj67.html#LiLMTY24</url>
<stream>streams/journals/cj</stream>
</article>
</r>
<r><inproceedings key="conf/ccs/Meng0TM24" mdate="2024-12-22">
<author orcid="0000-0002-5648-5049" pid="92/7038">Long Meng</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author orcid="0000-0002-6624-5380" pid="188/7576">Yangguang Tian</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.</title>
<pages>4688-4702</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3670321</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#Meng0TM24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/ManulisN24" mdate="2024-06-18">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0009-0008-9647-9592" pid="368/7149">J&#233;r&#244;me Nguyen</author>
<title>Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability.</title>
<pages>63-93</pages>
<year>2024</year>
<booktitle>EUROCRYPT (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-58723-8_3</ee>
<crossref>conf/eurocrypt/2024-2</crossref>
<url>db/conf/eurocrypt/eurocrypt2024-2.html#ManulisN24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/Meng0TML24" mdate="2024-07-22">
<author pid="92/7038">Long Meng</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="188/7576">Yangguang Tian</author>
<author pid="62/484">Mark Manulis</author>
<author pid="166/1411">Suhui Liu</author>
<title>FEASE: Fast and Expressive Asymmetric Searchable Encryption.</title>
<year>2024</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity24/presentation/meng</ee>
<crossref>conf/uss/2024</crossref>
<url>db/conf/uss/uss2024.html#Meng0TML24</url>
</inproceedings>
</r>
<r><proceedings key="conf/secitc/2023" mdate="2024-02-14">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<editor orcid="0000-0002-9541-5705" pid="68/11234">Diana Maimut</editor>
<editor orcid="0000-0003-3953-2744" pid="181/1566">George Teseleanu</editor>
<title>Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers</title>
<booktitle>SecITC</booktitle>
<publisher>Springer</publisher>
<year>2024</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>14534</volume>
<isbn>978-3-031-52946-7</isbn>
<isbn>978-3-031-52947-4</isbn>
<ee>https://doi.org/10.1007/978-3-031-52947-4</ee>
<url>db/conf/secitc/secitc2023.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/MengCTML24" mdate="2024-02-16">
<author pid="92/7038">Long Meng</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="188/7576">Yangguang Tian</author>
<author pid="62/484">Mark Manulis</author>
<author pid="166/1411">Suhui Liu</author>
<title>FEASE: Fast and Expressive Asymmetric Searchable Encryption.</title>
<pages>54</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/054</ee>
<url>db/journals/iacr/iacr2024.html#MengCTML24</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisN24" mdate="2024-02-16">
<author pid="62/484">Mark Manulis</author>
<author pid="368/7149">J&#233;r&#244;me Nguyen</author>
<title>Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability.</title>
<pages>202</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/202</ee>
<url>db/journals/iacr/iacr2024.html#ManulisN24</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisN24a" mdate="2024-07-01">
<author pid="62/484">Mark Manulis</author>
<author pid="348/3825">Hugo Nartz</author>
<title>Distributed Asynchronous Remote Key Generation.</title>
<pages>846</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/846</ee>
<url>db/journals/iacr/iacr2024.html#ManulisN24a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiuM24" mdate="2024-08-13">
<author pid="49/1245-3">Jia Liu 0003</author>
<author pid="62/484">Mark Manulis</author>
<title>Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.</title>
<pages>968</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/968</ee>
<url>db/journals/iacr/iacr2024.html#LiuM24</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/MengCTM24" mdate="2024-07-01">
<author pid="92/7038">Long Meng</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="188/7576">Yangguang Tian</author>
<author pid="62/484">Mark Manulis</author>
<title>FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.</title>
<pages>986</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/986</ee>
<url>db/journals/iacr/iacr2024.html#MengCTM24</url>
</article>
</r>
<r><inproceedings key="conf/acns/FrymannGMN23" mdate="2024-10-06">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0009-0001-5741-1439" pid="348/3825">Hugo Nartz</author>
<title>Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems.</title>
<pages>394-421</pages>
<year>2023</year>
<booktitle>ACNS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-33488-7_15</ee>
<crossref>conf/acns/2023-1</crossref>
<url>db/conf/acns/acns2023-1.html#FrymannGMN23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/FrymannGM23" mdate="2024-05-07">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices.</title>
<pages>928-941</pages>
<year>2023</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP57164.2023.00059</ee>
<crossref>conf/eurosp/2023</crossref>
<url>db/conf/eurosp/eurosp2023.html#FrymannGM23</url>
</inproceedings>
</r>
<r><proceedings key="conf/nss/2023" mdate="2023-08-19">
<editor orcid="0000-0001-5628-7328" pid="09/6954">Shujun Li</editor>
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<editor pid="20/5513">Atsuko Miyaji</editor>
<title>Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings</title>
<booktitle>NSS</booktitle>
<publisher>Springer</publisher>
<year>2023</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13983</volume>
<isbn>978-3-031-39827-8</isbn>
<isbn>978-3-031-39828-5</isbn>
<ee>https://doi.org/10.1007/978-3-031-39828-5</ee>
<url>db/conf/nss/nss2023.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/FrymannGM23" mdate="2023-03-31">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices.</title>
<pages>419</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/419</ee>
<url>db/journals/iacr/iacr2023.html#FrymannGM23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FrymannGMN23" mdate="2023-06-05">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<author pid="348/3825">Hugo Nartz</author>
<title>Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems.</title>
<pages>456</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/456</ee>
<url>db/journals/iacr/iacr2023.html#FrymannGMN23</url>
</article>
</r>
<r><article key="journals/tsc/YangCCDMSMBJM22" mdate="2022-06-28">
<author orcid="0000-0002-2840-992X" pid="83/89">Yifan Yang</author>
<author pid="194/8824">Daniel Cooper</author>
<author orcid="0000-0003-3580-4685" pid="72/4504">John P. Collomosse</author>
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0002-3611-0370" pid="161/3175">Jamie Steane</author>
<author orcid="0000-0002-9279-3604" pid="85/8672">Arthi Manohar</author>
<author orcid="0000-0002-4041-1918" pid="128/9576">Jo Briggs</author>
<author orcid="0000-0002-2716-051X" pid="174/2867">Helen S. Jones</author>
<author orcid="0000-0002-1485-4723" pid="95/2185">Wendy Moncur</author>
<title>TAPESTRY: A De-Centralized Service for Trusted Interaction Online.</title>
<pages>1385-1398</pages>
<year>2022</year>
<volume>15</volume>
<journal>IEEE Trans. Serv. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TSC.2020.2993081</ee>
<url>db/journals/tsc/tsc15.html#YangCCDMSMBJM22</url>
</article>
</r>
<r><inproceedings key="conf/acns/GardhamM22" mdate="2022-12-07">
<author orcid="0000-0002-8856-1093" pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Revocable Hierarchical Attribute-Based Signatures from Lattices.</title>
<pages>459-479</pages>
<year>2022</year>
<booktitle>ACNS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-09234-3_23</ee>
<crossref>conf/acns/2022</crossref>
<url>db/conf/acns/acns2022.html#GardhamM22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csr2/CaballeroKSTTBC22" mdate="2025-04-16">
<author pid="326/7892">M. Caballero</author>
<author pid="238/1084">Dimitris Kavallieros</author>
<author pid="246/5637">Arnolnt Spyros</author>
<author pid="326/7694">A. Tavernarakisv</author>
<author orcid="0000-0003-0730-0076" pid="276/1906">Athanasios Tziouvaras</author>
<author pid="87/2801">Stefano Bonacina</author>
<author pid="326/7400">K. Chandrarmouli</author>
<author pid="326/7843">M. Coroiu</author>
<author pid="93/6789">L. Chen</author>
<author pid="326/7451">T. Dounia</author>
<author pid="18/9638">Ioannis Giannoulakis</author>
<author pid="326/7460">N. Gligoric</author>
<author pid="62/1987">Emmanouil Kafetzakis</author>
<author pid="326/7715">T. Kasig</author>
<author orcid="0000-0003-3132-0165" pid="54/9051">Vaios Koumaras</author>
<author pid="326/7616">T. Krousarlis</author>
<author pid="326/7703">K. Lapidaki</author>
<author pid="326/7622">A. Markakis</author>
<author pid="326/7655">S. Marin</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="66/10870">Sofia-Anna Menesidou</author>
<author pid="152/3060">Sokratis Nifakos</author>
<author pid="29/5461">L. Meng</author>
<author pid="326/7687">S. Mhiri</author>
<author pid="326/7656">M. Nati</author>
<author pid="326/7787">K. Ntafloukas</author>
<author pid="326/7515">D. Oniga</author>
<author pid="151/5728">Dimitrios Papamartzivanos</author>
<author pid="19/6342">Spyros Papastergiou</author>
<author pid="119/5264">K. Sanchez</author>
<author pid="137/6245">Christos Sakkas</author>
<author pid="326/7495">K. Stelliou</author>
<author pid="326/7876">L. Trujillo</author>
<author pid="09/2945">Theodora Tsikrika</author>
<author pid="326/7704">E. Venegas</author>
<author pid="44/6029">Stefanos Vrochidis</author>
<author pid="326/7732">D. Xydias</author>
<title>ICT in Healthcare: the role of IoT and the SECANT solution.</title>
<pages>104-111</pages>
<year>2022</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR54599.2022.9850319</ee>
<crossref>conf/csr2/2022</crossref>
<url>db/conf/csr2/csr2022.html#CaballeroKSTTBC22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/FrymannGM22" mdate="2022-12-07">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Unlinkable Delegation of WebAuthn Credentials.</title>
<pages>125-144</pages>
<year>2022</year>
<booktitle>ESORICS (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-17143-7_7</ee>
<crossref>conf/esorics/2022-3</crossref>
<url>db/conf/esorics/esorics2022-3.html#FrymannGM22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/FrymannGM22" mdate="2022-03-22">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>Unlinkable Delegation of WebAuthn Credentials.</title>
<pages>303</pages>
<year>2022</year>
<volume>2022</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2022/303</ee>
<url>db/journals/iacr/iacr2022.html#FrymannGM22</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GardhamM22" mdate="2022-04-21">
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>Revocable Hierarchical Attribute-based Signatures from Lattices.</title>
<pages>397</pages>
<year>2022</year>
<volume>2022</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2022/397</ee>
<url>db/journals/iacr/iacr2022.html#GardhamM22</url>
</article>
</r>
<r><article key="journals/ijisec/ManulisBHSD21" mdate="2024-08-04">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0003-0250-7529" pid="68/3379">Christopher P. Bridges</author>
<author pid="24/4977">R. Harrison</author>
<author pid="294/0486">Venkkatesh Sekar</author>
<author pid="60/920">Andy Davis</author>
<title>Cyber security in New Space.</title>
<pages>287-311</pages>
<year>2021</year>
<volume>20</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-020-00503-w</ee>
<url>db/journals/ijisec/ijisec20.html#ManulisBHSD21</url>
</article>
</r>
<r><article key="journals/ijisec/ChenHMS21" mdate="2023-08-28">
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="21/506">Kaibin Huang</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="294/0486">Venkkatesh Sekar</author>
<title>Password-authenticated searchable encryption.</title>
<pages>675-693</pages>
<year>2021</year>
<volume>20</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.1007/s10207-020-00524-5</ee>
<ee>https://www.wikidata.org/entity/Q114691469</ee>
<url>db/journals/ijisec/ijisec20.html#ChenHMS21</url>
</article>
</r>
<r><inproceedings key="conf/acns/GardhamMD20" mdate="2022-10-02">
<author orcid="0000-0002-8856-1093" pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<title>Biometric-Authenticated Searchable Encryption.</title>
<pages>40-61</pages>
<year>2020</year>
<booktitle>ACNS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-57878-7_3</ee>
<crossref>conf/acns/2020-2</crossref>
<url>db/conf/acns/acns2020-2.html#GardhamMD20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/FrymannGKLMN20" mdate="2025-10-14">
<author pid="255/5329">Nick Frymann</author>
<author orcid="0000-0002-8856-1093" pid="222/6614">Daniel Gardham</author>
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author pid="273/4642">Emil Lundberg</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="273/4790">Dain Nilsson</author>
<title>Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.</title>
<pages>939-954</pages>
<year>2020</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3372297.3417292</ee>
<ee>https://www.wikidata.org/entity/Q130956300</ee>
<crossref>conf/ccs/2020</crossref>
<url>db/conf/ccs/ccs2020.html#FrymannGKLMN20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/CaseyMNST20" mdate="2024-11-04">
<author pid="27/7687-1">Matthew Casey 0001</author>
<author pid="62/484">Mark Manulis</author>
<author orcid="0000-0003-1262-2192" pid="121/5010">Christopher J. P. Newton</author>
<author pid="280/4314">Robin Savage</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>An Interoperable Architecture for Usable Password-Less Authentication.</title>
<pages>16-32</pages>
<year>2020</year>
<booktitle>ETAA@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-64455-0_2</ee>
<crossref>conf/esorics/2020etaa</crossref>
<url>db/conf/esorics/etaa2020.html#CaseyMNST20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/DraganM20" mdate="2021-04-09">
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>KYChain: user-controlled KYC data sharing and certification.</title>
<pages>301-307</pages>
<year>2020</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3341105.3373895</ee>
<crossref>conf/sac/2020</crossref>
<url>db/conf/sac/sac2020.html#DraganM20</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2020detips" mdate="2023-12-10">
<editor orcid="0000-0001-5864-777X" pid="12/4955">Ioana Boureanu</editor>
<editor orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</editor>
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<editor orcid="0000-0003-0663-2263" pid="96/1667">Thanassis Giannetsos</editor>
<editor orcid="0000-0002-1575-4572" pid="86/6966">Christoforos Dadoyan</editor>
<editor pid="67/4413">Panagiotis Gouvas</editor>
<editor orcid="0000-0002-0971-2077" pid="169/6354">Roger A. Hallman</editor>
<editor pid="09/6954">Shujun Li</editor>
<editor pid="158/5207">Victor Chang 0001</editor>
<editor orcid="0000-0002-5543-0265" pid="06/8643">Frank Pallas</editor>
<editor pid="116/3061">J&#246;rg Pohle</editor>
<editor orcid="0000-0003-1823-5505" pid="s/MASasse">M. Angela Sasse</editor>
<title>Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers</title>
<booktitle>DETIPS/DeSECSys/MPS/SPOSE@ESORICS</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12580</volume>
<isbn>978-3-030-66503-6</isbn>
<isbn>978-3-030-66504-3</isbn>
<ee>https://doi.org/10.1007/978-3-030-66504-3</ee>
<url>db/conf/esorics/detips2020.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2001-01659" mdate="2020-01-10">
<author pid="77/7303">Constantin Catalin Dragan</author>
<author pid="62/484">Mark Manulis</author>
<title>KYChain: User-Controlled KYC Data Sharing and Certification.</title>
<year>2020</year>
<volume>abs/2001.01659</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/2001.01659</ee>
<url>db/journals/corr/corr2001.html#abs-2001-01659</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GardhamMD20" mdate="2020-05-11">
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<author pid="77/7303">Constantin Catalin Dragan</author>
<title>Biometric-Authenticated Searchable Encryption.</title>
<pages>17</pages>
<year>2020</year>
<volume>2020</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2020/017</ee>
<url>db/journals/iacr/iacr2020.html#GardhamMD20</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FrymannGKLMN20" mdate="2020-09-02">
<author pid="255/5329">Nick Frymann</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="273/4642">Emil Lundberg</author>
<author pid="62/484">Mark Manulis</author>
<author pid="273/4790">Dain Nilsson</author>
<title>Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.</title>
<pages>1004</pages>
<year>2020</year>
<volume>2020</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2020/1004</ee>
<url>db/journals/iacr/iacr2020.html#FrymannGKLMN20</url>
</article>
</r>
<r><inproceedings key="conf/acns/GardhamM19" mdate="2022-10-02">
<author orcid="0000-0002-8856-1093" pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length.</title>
<pages>89-109</pages>
<year>2019</year>
<booktitle>ACNS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-21568-2_5</ee>
<crossref>conf/acns/2019</crossref>
<url>db/conf/acns/acns2019.html#GardhamM19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/LiuM19" mdate="2024-08-08">
<author orcid="0000-0001-7094-9324" pid="49/1245-3">Jia Liu 0003</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>pRate: Anonymous Star Rating with Rating Secrecy.</title>
<pages>550-570</pages>
<year>2019</year>
<booktitle>ACNS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-21568-2_27</ee>
<crossref>conf/acns/2019</crossref>
<url>db/conf/acns/acns2019.html#LiuM19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/RubioMAL19" mdate="2025-03-03">
<author orcid="0000-0002-7338-9390" pid="204/5226">Juan E. Rubio</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="83/4732">Cristina Alcaraz</author>
<author pid="02/3236-1">Javier L&#243;pez 0001</author>
<title>Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.</title>
<pages>263-280</pages>
<year>2019</year>
<booktitle>ESORICS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-29962-0_13</ee>
<crossref>conf/esorics/2019-2</crossref>
<url>db/conf/esorics/esorics2019-2.html#RubioMAL19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1905-06186" mdate="2026-03-24">
<author pid="83/89">Yifan Yang</author>
<author pid="194/8824">Daniel Cooper</author>
<author pid="72/4504">John P. Collomosse</author>
<author pid="77/7303">Constantin Catalin Dragan</author>
<author pid="62/484">Mark Manulis</author>
<author pid="161/3175">Jamie Steane</author>
<author pid="85/8672">Arthi Manohar</author>
<author orcid="0000-0002-4041-1918" pid="128/9576">Jo Briggs</author>
<author pid="174/2867">Helen S. Jones</author>
<author orcid="0000-0002-1485-4723" pid="95/2185">Wendy Moncur</author>
<title>TAPESTRY: A Blockchain based Service for Trusted Interaction Online.</title>
<year>2019</year>
<volume>abs/1905.06186</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1905.06186</ee>
<url>db/journals/corr/corr1905.html#abs-1905-06186</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1912-05064" mdate="2020-01-02">
<author pid="255/5329">Nick Frymann</author>
<author pid="62/484">Mark Manulis</author>
<title>Securing Fleets of Consumer Drones at Low Cost.</title>
<year>2019</year>
<volume>abs/1912.05064</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1912.05064</ee>
<url>db/journals/corr/corr1912.html#abs-1912-05064</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiuM19" mdate="2024-08-15">
<author pid="49/1245-3">Jia Liu 0003</author>
<author pid="62/484">Mark Manulis</author>
<title>pRate: Anonymous Star Rating with Rating Secrecy.</title>
<pages>378</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/378</ee>
<url>db/journals/iacr/iacr2019.html#LiuM19</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GardhamM19" mdate="2020-05-11">
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length.</title>
<pages>382</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/382</ee>
<url>db/journals/iacr/iacr2019.html#GardhamM19</url>
</article>
</r>
<r><inproceedings key="conf/cans/DraganGM18" mdate="2022-10-02">
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author orcid="0000-0002-8856-1093" pid="222/6614">Daniel Gardham</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Hierarchical Attribute-Based Signatures.</title>
<pages>213-234</pages>
<year>2018</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00434-7_11</ee>
<crossref>conf/cans/2018</crossref>
<url>db/conf/cans/cans2018.html#DraganGM18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/DraganM18" mdate="2019-09-25">
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Bootstrapping Online Trust: Timeline Activity Proofs.</title>
<pages>242-259</pages>
<year>2018</year>
<booktitle>DPM/CBT@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00305-0_18</ee>
<crossref>conf/esorics/2018dpm</crossref>
<url>db/conf/esorics/dpm2018.html#DraganM18</url>
</inproceedings>
</r>
<r><proceedings key="conf/isw/2018" mdate="2024-08-20">
<editor pid="22/150-2">Liqun Chen 0002</editor>
<editor pid="62/484">Mark Manulis</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings</title>
<booktitle>ISC</booktitle>
<publisher>Springer</publisher>
<year>2018</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11060</volume>
<isbn>978-3-319-99135-1</isbn>
<isbn>978-3-319-99136-8</isbn>
<ee>https://doi.org/10.1007/978-3-319-99136-8</ee>
<url>db/conf/isw/isc2018.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/DraganGM18" mdate="2020-05-11">
<author pid="77/7303">Constantin Catalin Dragan</author>
<author pid="222/6614">Daniel Gardham</author>
<author pid="62/484">Mark Manulis</author>
<title>Hierarchical Attribute-based Signatures.</title>
<pages>610</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/610</ee>
<url>db/journals/iacr/iacr2018.html#DraganGM18</url>
</article>
</r>
<r><inproceedings key="conf/pac/HuangMC17" mdate="2023-03-23">
<author pid="21/506">Kaibin Huang</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<title>Password Authenticated Keyword Search.</title>
<pages>129-140</pages>
<year>2017</year>
<booktitle>PAC</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/PAC.2017.11</ee>
<crossref>conf/pac/2017</crossref>
<url>db/conf/pac/pac2017.html#HuangMC17</url>
</inproceedings>
</r>
<r><article key="journals/ijisec/ManulisSKD16" mdate="2025-10-14">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author pid="152/5223">Nick Denham</author>
<title>Secure modular password authentication for the web using channel bindings.</title>
<pages>597-620</pages>
<year>2016</year>
<volume>15</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>6</number>
<ee type="oa">https://doi.org/10.1007/s10207-016-0348-7</ee>
<ee>https://www.wikidata.org/entity/Q59464950</ee>
<url>db/journals/ijisec/ijisec15.html#ManulisSKD16</url>
</article>
</r>
<r><inproceedings key="conf/ccs/KieferM16" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Blind Password Registration for Verifier-based PAKE.</title>
<pages>39-48</pages>
<year>2016</year>
<booktitle>AsiaPKC@AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/2898420.2898424</ee>
<ee>https://www.wikidata.org/entity/Q130954932</ee>
<crossref>conf/ccs/2016asiapkc</crossref>
<url>db/conf/ccs/asiapkc2016.html#KieferM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/KieferM16" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.</title>
<pages>95-114</pages>
<year>2016</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-45871-7_7</ee>
<crossref>conf/isw/2016</crossref>
<url>db/conf/isw/isc2016.html#KieferM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/KieferM16a" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Universally Composable Two-Server PAKE.</title>
<pages>147-166</pages>
<year>2016</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-45871-7_10</ee>
<crossref>conf/isw/2016</crossref>
<url>db/conf/isw/isc2016.html#KieferM16a</url>
</inproceedings>
</r>
<r><proceedings key="conf/acns/2016" mdate="2020-08-07">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<editor pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings</title>
<booktitle>ACNS</booktitle>
<publisher>Springer</publisher>
<year>2016</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>9696</volume>
<isbn>978-3-319-39554-8</isbn>
<ee>https://doi.org/10.1007/978-3-319-39555-5</ee>
<url>db/conf/acns/acns2016.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/KieferM16" mdate="2020-05-11">
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<title>Blind Password Registration for Verifier-based PAKE.</title>
<pages>442</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/442</ee>
<url>db/journals/iacr/iacr2016.html#KieferM16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KieferM16a" mdate="2020-05-11">
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<title>Universally Composable Two-Server PAKE.</title>
<pages>520</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/520</ee>
<url>db/journals/iacr/iacr2016.html#KieferM16a</url>
</article>
</r>
<r><inproceedings key="conf/intrust/KuchtaM15" mdate="2018-11-02">
<author pid="137/5239">Veronika Kuchta</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Public Key Encryption with Distributed Keyword Search.</title>
<pages>62-83</pages>
<year>2015</year>
<booktitle>INTRUST</booktitle>
<ee>https://doi.org/10.1007/978-3-319-31550-8_5</ee>
<crossref>conf/intrust/2015</crossref>
<url>db/conf/intrust/intrust2015.html#KuchtaM15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/KieferM15" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Oblivious PAKE: Efficient Handling of Password Trials.</title>
<pages>191-208</pages>
<year>2015</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23318-5_11</ee>
<crossref>conf/isw/2015</crossref>
<url>db/conf/isw/isc2015.html#KieferM15</url>
</inproceedings>
</r>
<r><article key="journals/cj/NietoMS14" mdate="2023-08-28">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="30/7002">Dongdong Sun</author>
<title>Forward-Secure Hierarchical Predicate Encryption.</title>
<pages>510-536</pages>
<year>2014</year>
<volume>57</volume>
<journal>Comput. J.</journal>
<number>4</number>
<ee>https://doi.org/10.1093/comjnl/bxt029</ee>
<ee>https://www.wikidata.org/entity/Q121030001</ee>
<url>db/journals/cj/cj57.html#NietoMS14</url>
</article>
</r>
<r><article key="journals/ijisec/ManulisPS14" mdate="2024-05-07">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>Plaintext awareness in identity-based key encapsulation.</title>
<pages>25-49</pages>
<year>2014</year>
<volume>13</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10207-013-0218-5</ee>
<url>db/journals/ijisec/ijisec13.html#ManulisPS14</url>
</article>
</r>
<r><inproceedings key="conf/acns/KieferM14" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.</title>
<pages>199-216</pages>
<year>2014</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-07536-5_13</ee>
<crossref>conf/acns/2014</crossref>
<url>db/conf/acns/acns2014.html#KieferM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/RadkeBNMS14" mdate="2019-07-25">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="67/675">Douglas Stebila</author>
<title>Formalising Human Recognition: a Fundamental Building Block for Security Proofs.</title>
<pages>37-45</pages>
<year>2014</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html</ee>
<crossref>conf/auisc/2014</crossref>
<url>db/conf/auisc/auisc2014.html#RadkeBNMS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/GuntherMP14" mdate="2025-05-26">
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author pid="62/484">Mark Manulis</author>
<author pid="43/8243">Andreas Peter 0001</author>
<title>Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.</title>
<pages>321-336</pages>
<year>2014</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-12280-9_21</ee>
<crossref>conf/cans/2014</crossref>
<url>db/conf/cans/cans2014.html#GuntherMP14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/KieferM14" mdate="2025-10-14">
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.</title>
<pages>295-312</pages>
<year>2014</year>
<booktitle>ESORICS (2)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-11212-1_17</ee>
<crossref>conf/esorics/2014-2</crossref>
<url>db/conf/esorics/esorics2014-2.html#KieferM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/intrust/KuchtaM14" mdate="2018-11-02">
<author pid="137/5239">Veronika Kuchta</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Rerandomizable Threshold Blind Signatures.</title>
<pages>70-89</pages>
<year>2014</year>
<booktitle>INTRUST</booktitle>
<ee>https://doi.org/10.1007/978-3-319-27998-5_5</ee>
<crossref>conf/intrust/2014</crossref>
<url>db/conf/intrust/intrust2014.html#KuchtaM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secsr/ManulisSD14" mdate="2024-05-07">
<author pid="62/484">Mark Manulis</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="152/5223">Nick Denham</author>
<title>Secure Modular Password Authentication for the Web Using Channel Bindings.</title>
<pages>167-189</pages>
<year>2014</year>
<booktitle>SSR</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14054-4_11</ee>
<crossref>conf/secsr/2014</crossref>
<url>db/conf/secsr/ssr2014.html#ManulisSD14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secsr/FleischhackerMA14" mdate="2018-11-02">
<author orcid="0000-0002-2770-5444" pid="78/10700">Nils Fleischhacker</author>
<author pid="62/484">Mark Manulis</author>
<author pid="133/2363">Amir Azodi</author>
<title>A Modular Framework for Multi-Factor Authentication and Key Exchange.</title>
<pages>190-214</pages>
<year>2014</year>
<booktitle>SSR</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14054-4_12</ee>
<crossref>conf/secsr/2014</crossref>
<url>db/conf/secsr/ssr2014.html#FleischhackerMA14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/KieferM14" mdate="2020-05-11">
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<title>Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.</title>
<pages>242</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/242</ee>
<url>db/journals/iacr/iacr2014.html#KieferM14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KieferM14a" mdate="2020-05-11">
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<title>Distributed Smooth Projective Hashing and its Application to Two-Server PAKE.</title>
<pages>350</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/350</ee>
<url>db/journals/iacr/iacr2014.html#KieferM14a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GuntherMP14" mdate="2025-05-26">
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author pid="62/484">Mark Manulis</author>
<author pid="43/8243">Andreas Peter 0001</author>
<title>Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.</title>
<pages>382</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/382</ee>
<url>db/journals/iacr/iacr2014.html#GuntherMP14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisSD14" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="67/675">Douglas Stebila</author>
<author pid="152/5223">Nick Denham</author>
<title>Secure modular password authentication for the web using channel bindings.</title>
<pages>731</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/731</ee>
<url>db/journals/iacr/iacr2014.html#ManulisSD14</url>
</article>
</r>
<r><article key="journals/ieicet/ManulisSU13" mdate="2025-05-31">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="16/794">Koutarou Suzuki</author>
<author orcid="0000-0002-0411-9389" pid="73/5050">Berkant Ustaoglu</author>
<title>Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.</title>
<pages>101-110</pages>
<year>2013</year>
<volume>96-A</volume>
<journal>IEICE Trans. Fundam. Electron. Commun. Comput. Sci.</journal>
<number>1</number>
<ee>https://doi.org/10.1587/transfun.E96.A.101</ee>
<ee>http://search.ieice.org/bin/summary.php?id=e96-a_1_101</ee>
<url>db/journals/ieicet/ieicet96a.html#ManulisSU13</url>
</article>
</r>
<r><article key="journals/ijisec/CristofaroMP13" mdate="2018-11-30">
<author pid="36/6225">Emiliano De Cristofaro</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Private discovery of common social contacts.</title>
<pages>49-65</pages>
<year>2013</year>
<volume>12</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10207-012-0183-4</ee>
<url>db/journals/ijisec/ijisec12.html#CristofaroMP13</url>
</article>
</r>
<r><article key="journals/istr/AskoxylakisMP13" mdate="2023-08-28">
<author pid="62/5706">Ioannis G. Askoxylakis</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="p/JPosegga">Joachim Posegga</author>
<title>Security and privacy for digital ecosystems.</title>
<pages>45</pages>
<year>2013</year>
<volume>17</volume>
<journal>Inf. Secur. Tech. Rep.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.istr.2013.02.001</ee>
<ee>https://www.wikidata.org/entity/Q115041921</ee>
<url>db/journals/istr/istr17.html#AskoxylakisMP13</url>
</article>
</r>
<r><article key="journals/jcs/NietoMPRS13" mdate="2024-05-07">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>Publicly verifiable ciphertexts.</title>
<pages>749-778</pages>
<year>2013</year>
<volume>21</volume>
<journal>J. Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JCS-130473</ee>
<ee>https://www.wikidata.org/entity/Q114944939</ee>
<url>db/journals/jcs/jcs21.html#NietoMPRS13</url>
</article>
</r>
<r><inproceedings key="conf/acisp/WangMAS13" mdate="2022-08-09">
<author pid="181/2842-74">Yang Wang 0074</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0003-2068-9530" pid="55/24">Man Ho Au</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Relations among Privacy Notions for Signcryption and Key Invisible &#34;Sign-then-Encrypt&#34;.</title>
<pages>187-202</pages>
<year>2013</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-39059-3_13</ee>
<crossref>conf/acisp/2013</crossref>
<url>db/conf/acisp/acisp2013.html#WangMAS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/KuchtaM13" mdate="2018-11-02">
<author pid="137/5239">Veronika Kuchta</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.</title>
<pages>251-270</pages>
<year>2013</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-02937-5_14</ee>
<crossref>conf/cans/2013</crossref>
<url>db/conf/cans/cans2013.html#KuchtaM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/FleischhackerGKMP13" mdate="2025-10-14">
<author orcid="0000-0002-2770-5444" pid="78/10700">Nils Fleischhacker</author>
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author orcid="0009-0003-3632-4613" pid="12/10661">Franziskus Kiefer</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Pseudorandom signatures.</title>
<pages>107-118</pages>
<year>2013</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/2484313.2484325</ee>
<ee>https://www.wikidata.org/entity/Q130969386</ee>
<crossref>conf/ccs/2013asia</crossref>
<url>db/conf/ccs/asiaccs2013.html#FleischhackerGKMP13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/KieferM13" mdate="2020-05-11">
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<title>Oblivious PAKE and Efficient Handling of Password Trials.</title>
<pages>127</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/127</ee>
<url>db/journals/iacr/iacr2013.html#KieferM13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WangMAS13" mdate="2022-08-09">
<author pid="181/2842-74">Yang Wang 0074</author>
<author pid="62/484">Mark Manulis</author>
<author pid="55/24">Man Ho Au</author>
<author pid="12/3447">Willy Susilo</author>
<title>Relations among Privacy Notions for Signcryption and Key Invisible &#34;Sign-then-Encrypt&#34;.</title>
<pages>230</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/230</ee>
<url>db/journals/iacr/iacr2013.html#WangMAS13</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/StelleMH12" mdate="2025-03-03">
<author pid="119/7821">Stanislaus Stelle</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0002-9163-5989" pid="95/1816">Matthias Hollick</author>
<title>Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.</title>
<pages>28-37</pages>
<year>2012</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2012.36</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2012.36</ee>
<crossref>conf/IEEEares/2012</crossref>
<url>db/conf/IEEEares/ares2012.html#StelleMH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/FujiokaMSU12" mdate="2019-12-27">
<author pid="77/4040">Atsushi Fujioka</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="16/794">Koutarou Suzuki</author>
<author orcid="0000-0002-0411-9389" pid="73/5050">Berkant Ustaoglu</author>
<title>Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.</title>
<pages>15-28</pages>
<year>2012</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31448-3_2</ee>
<crossref>conf/acisp/2012</crossref>
<url>db/conf/acisp/acisp2012.html#FujiokaMSU12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/NietoMS12" mdate="2018-11-02">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="30/7002">Dongdong Sun</author>
<title>Fully Private Revocable Predicate Encryption.</title>
<pages>350-363</pages>
<year>2012</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31448-3_26</ee>
<crossref>conf/acisp/2012</crossref>
<url>db/conf/acisp/acisp2012.html#NietoMS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pairing/NietoMS12" mdate="2017-05-22">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="30/7002">Dongdong Sun</author>
<title>Forward-Secure Hierarchical Predicate Encryption.</title>
<pages>83-101</pages>
<year>2012</year>
<booktitle>Pairing</booktitle>
<ee>https://doi.org/10.1007/978-3-642-36334-4_6</ee>
<crossref>conf/pairing/2012</crossref>
<url>db/conf/pairing/pairing2012.html#NietoMS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scn/NietoMPRS12" mdate="2024-05-07">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>Publicly Verifiable Ciphertexts.</title>
<pages>393-410</pages>
<year>2012</year>
<booktitle>SCN</booktitle>
<ee>https://doi.org/10.1007/978-3-642-32928-9_22</ee>
<crossref>conf/scn/2012</crossref>
<url>db/conf/scn/scn2012.html#NietoMPRS12</url>
</inproceedings>
</r>
<r><proceedings key="conf/cans/2012" mdate="2019-06-02">
<editor pid="p/JosefPieprzyk">Josef Pieprzyk</editor>
<editor pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</editor>
<editor pid="62/484">Mark Manulis</editor>
<title>Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings</title>
<publisher>Springer</publisher>
<year>2012</year>
<isbn>978-3-642-35403-8</isbn>
<isbn>978-3-642-35404-5</isbn>
<ee>https://doi.org/10.1007/978-3-642-35404-5</ee>
<ee>https://www.wikidata.org/entity/Q62559228</ee>
<booktitle>CANS</booktitle>
<url>db/conf/cans/cans2012.html</url>
<volume>7712</volume>
</proceedings>
</r>
<r><proceedings key="conf/pkc/2012" mdate="2020-11-16">
<editor pid="72/5460">Marc Fischlin</editor>
<editor pid="b/JohannesBuchmann">Johannes Buchmann 0001</editor>
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<title>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</title>
<volume>7293</volume>
<year>2012</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<ee>https://doi.org/10.1007/978-3-642-30057-8</ee>
<isbn>978-3-642-30056-1</isbn>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc2012.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/CamenischMTW12" mdate="2017-06-07">
<author pid="c/JanCamenisch">Jan Camenisch</author>
<author pid="62/484">Mark Manulis</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="w/RebeccaNWright">Rebecca N. Wright</author>
<title>Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).</title>
<pages>165-183</pages>
<year>2012</year>
<volume>2</volume>
<journal>Dagstuhl Reports</journal>
<number>9</number>
<ee type="oa">https://doi.org/10.4230/DagRep.2.9.165</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports2.html#CamenischMTW12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FleischhackerMS12" mdate="2020-05-11">
<author pid="78/10700">Nils Fleischhacker</author>
<author pid="62/484">Mark Manulis</author>
<author pid="133/2363">Amir Azodi</author>
<title>Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.</title>
<pages>181</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/181</ee>
<url>db/journals/iacr/iacr2012.html#FleischhackerMS12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/NietoMPRS12" mdate="2020-05-11">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author pid="68/9125">Jothi Rangasamy</author>
<author pid="67/675">Douglas Stebila</author>
<title>Publicly Verifiable Ciphertexts.</title>
<pages>357</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/357</ee>
<url>db/journals/iacr/iacr2012.html#NietoMPRS12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/NietoMS12" mdate="2020-05-11">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="30/7002">Dongdong Sun</author>
<title>Forward-Secure Hierarchical Predicate Encryption.</title>
<pages>402</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/402</ee>
<url>db/journals/iacr/iacr2012.html#NietoMS12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/NietoMS12a" mdate="2020-05-11">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="30/7002">Dongdong Sun</author>
<title>Fully Private Revocable Predicate Encryption.</title>
<pages>403</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/403</ee>
<url>db/journals/iacr/iacr2012.html#NietoMS12a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisPS12" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author pid="67/675">Douglas Stebila</author>
<title>Plaintext Awareness in Identity-Based Key Encapsulation.</title>
<pages>559</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/559</ee>
<url>db/journals/iacr/iacr2012.html#ManulisPS12</url>
</article>
</r>
<r><article key="journals/cn/LeroyDCMKB11" mdate="2020-02-19">
<author pid="56/1612">Damien Leroy</author>
<author pid="37/9595">Gregory Detal</author>
<author pid="02/1274">Julien Cathalo</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="90/3627">Fran&#231;ois Koeune</author>
<author pid="91/2043">Olivier Bonaventure</author>
<title>SWISH: Secure WiFi sharing.</title>
<pages>1614-1630</pages>
<year>2011</year>
<volume>55</volume>
<journal>Comput. Networks</journal>
<number>7</number>
<ee>https://doi.org/10.1016/j.comnet.2011.01.012</ee>
<url>db/journals/cn/cn55.html#LeroyDCMKB11</url>
</article>
</r>
<r><article key="journals/tissec/GorantlaBNM11" mdate="2018-11-06">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Modeling key compromise impersonation attacks on group key exchange protocols.</title>
<pages>28:1-28:24</pages>
<year>2011</year>
<volume>14</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/2043628.2043629</ee>
<url>db/journals/tissec/tissec14.html#GorantlaBNM11</url>
</article>
</r>
<r><inproceedings key="conf/acns/CristofaroMP11" mdate="2019-08-20">
<author pid="36/6225">Emiliano De Cristofaro</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Private Discovery of Common Social Contacts.</title>
<pages>147-165</pages>
<year>2011</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21554-4_9</ee>
<crossref>conf/acns/2011</crossref>
<url>db/conf/acns/acns2011.html#CristofaroMP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/FischlinLM11" mdate="2018-11-02">
<author pid="72/5460">Marc Fischlin</author>
<author pid="62/1759">Beno&#238;t Libert</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.</title>
<pages>468-485</pages>
<year>2011</year>
<booktitle>ASIACRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-25385-0_25</ee>
<crossref>conf/asiacrypt/2011</crossref>
<url>db/conf/asiacrypt/asiacrypt2011.html#FischlinLM11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/FanHM11" mdate="2018-11-02">
<author pid="34/1432">Chun-I Fan</author>
<author pid="89/936">Ruei-Hau Hsu</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Group Signature with Constant Revocation Costs for Signers and Verifiers.</title>
<pages>214-233</pages>
<year>2011</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-25513-7_16</ee>
<crossref>conf/cans/2011</crossref>
<url>db/conf/cans/cans2011.html#FanHM11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ManulisP11" mdate="2018-11-06">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Practical affiliation-hiding authentication from improved polynomial interpolation.</title>
<pages>286-295</pages>
<year>2011</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1966913.1966950</ee>
<crossref>conf/ccs/2011asia</crossref>
<url>db/conf/ccs/asiaccs2011.html#ManulisP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/GuntherMS11" mdate="2018-11-02">
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="69/2809">Thorsten Strufe</author>
<title>Cryptographic Treatment of Private User Profiles.</title>
<pages>40-54</pages>
<year>2011</year>
<booktitle>Financial Cryptography Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-642-29889-9_5</ee>
<crossref>conf/fc/2011w</crossref>
<url>db/conf/fc/fc2011w.html#GuntherMS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/ManulisS11" mdate="2018-11-02">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="47/10125">Marion Steiner</author>
<title>UPBA: User-Authenticated Property-Based Attestation.</title>
<pages>112-119</pages>
<year>2011</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2011.5971972</ee>
<crossref>conf/pst/2011</crossref>
<url>db/conf/pst/pst2011.html#ManulisS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wistp/ManulisP11" mdate="2018-11-02">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.</title>
<pages>85-99</pages>
<year>2011</year>
<booktitle>WISTP</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21040-2_6</ee>
<crossref>conf/wistp/2011</crossref>
<url>db/conf/wistp/wistp2011.html#ManulisP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wowmom/GuntherMS11" mdate="2023-03-24">
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="69/2809">Thorsten Strufe</author>
<title>Key management in distributed online social networks.</title>
<pages>1-7</pages>
<year>2011</year>
<booktitle>WOWMOM</booktitle>
<ee>https://doi.org/10.1109/WoWMoM.2011.5986171</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WoWMoM.2011.5986171</ee>
<crossref>conf/wowmom/2011</crossref>
<url>db/conf/wowmom/wowmom2011.html#GuntherMS11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CristofaroMP11" mdate="2020-05-11">
<author pid="36/6225">Emiliano De Cristofaro</author>
<author pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Private Discovery of Common Social Contacts.</title>
<pages>26</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/026</ee>
<url>db/journals/iacr/iacr2011.html#CristofaroMP11</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GuntherMS11" mdate="2020-05-11">
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author pid="62/484">Mark Manulis</author>
<author pid="69/2809">Thorsten Strufe</author>
<title>Cryptographic Treatment of Private User Profiles.</title>
<pages>64</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/064</ee>
<url>db/journals/iacr/iacr2011.html#GuntherMS11</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FleischhackerGKMP11" mdate="2020-05-11">
<author pid="78/10700">Nils Fleischhacker</author>
<author pid="34/10042">Felix G&#252;nther 0001</author>
<author pid="12/10661">Franziskus Kiefer</author>
<author pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Pseudorandom Signatures.</title>
<pages>673</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/673</ee>
<url>db/journals/iacr/iacr2011.html#FleischhackerGKMP11</url>
</article>
</r>
<r><article key="journals/dud/CatuognoLMSSW10" mdate="2024-05-07">
<author pid="04/3524">Luigi Catuogno</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<author pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="76/3305">Christian St&#252;ble</author>
<author pid="82/1691">Marcel Winandy</author>
<title>Trusted virtual domains: Color your network.</title>
<pages>289-294</pages>
<year>2010</year>
<volume>34</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s11623-010-0089-0</ee>
<url>db/journals/dud/dud34.html#CatuognoLMSSW10</url>
</article>
</r>
<r><article key="journals/ijwmc/ManulisS10" mdate="2020-07-03">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Key agreement for heterogeneous mobile ad-hoc groups.</title>
<pages>17-30</pages>
<year>2010</year>
<volume>4</volume>
<journal>Int. J. Wirel. Mob. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJWMC.2010.030972</ee>
<url>db/journals/ijwmc/ijwmc4.html#ManulisS10</url>
</article>
</r>
<r><inproceedings key="conf/acns/BrzuskaBDFFKMOPPS10" mdate="2025-05-26">
<author pid="88/5874">Christina Brzuska</author>
<author pid="61/9958">Heike Busch</author>
<author pid="72/8243">&#214;zg&#252;r Dagdelen</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="81/6493">Martin Franz</author>
<author pid="66/3585-1">Stefan Katzenbeisser 0001</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="59/8243">Cristina Onete</author>
<author pid="43/8243">Andreas Peter 0001</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-6943-8914" pid="52/6199">Dominique Schr&#246;der</author>
<title>Redactable Signatures for Tree-Structured Data: Definitions and Constructions.</title>
<pages>87-104</pages>
<year>2010</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-13708-2_6</ee>
<crossref>conf/acns/2010</crossref>
<url>db/conf/acns/acns2010.html#BrzuskaBDFFKMOPPS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/ManulisPT10" mdate="2019-08-20">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author pid="08/1183">Gene Tsudik</author>
<title>Affiliation-Hiding Key Exchange with Untrusted Group Authorities.</title>
<pages>402-419</pages>
<year>2010</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-13708-2_24</ee>
<crossref>conf/acns/2010</crossref>
<url>db/conf/acns/acns2010.html#ManulisPT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/ManulisPP10" mdate="2019-08-20">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="31/1735">Benny Pinkas</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Privacy-Preserving Group Discovery with Linear Complexity.</title>
<pages>420-437</pages>
<year>2010</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-13708-2_25</ee>
<crossref>conf/acns/2010</crossref>
<url>db/conf/acns/acns2010.html#ManulisPP10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/africacrypt/GalindoLFFLMS10" mdate="2018-11-02">
<author orcid="0000-0003-3563-5551" pid="21/2415">David Galindo</author>
<author pid="62/1759">Beno&#238;t Libert</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="27/3043">Georg Fuchsbauer</author>
<author pid="63/3592">Anja Lehmann</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0001-6943-8914" pid="52/6199">Dominique Schr&#246;der</author>
<title>Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.</title>
<pages>333-350</pages>
<year>2010</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-12678-9_20</ee>
<crossref>conf/africacrypt/2010</crossref>
<url>db/conf/africacrypt/africacrypt2010.html#GalindoLFFLMS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/africacrypt/AbdallaCMP10" mdate="2019-12-27">
<author orcid="0000-0002-2447-4329" pid="67/2285">Michel Abdalla</author>
<author pid="61/1937">C&#233;line Chevalier</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<title>Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.</title>
<pages>351-368</pages>
<year>2010</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-12678-9_21</ee>
<ee>https://www.wikidata.org/entity/Q56921086</ee>
<crossref>conf/africacrypt/2010</crossref>
<url>db/conf/africacrypt/africacrypt2010.html#AbdallaCMP10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/ChristinHM10" mdate="2025-03-03">
<author orcid="0000-0001-6802-2108" pid="60/7821">Delphine Christin</author>
<author orcid="0000-0002-9163-5989" pid="95/1816">Matthias Hollick</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.</title>
<pages>1-6</pages>
<year>2010</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2010.5560129</ee>
<crossref>conf/icccn/2010</crossref>
<url>db/conf/icccn/icccn2010.html#ChristinHM10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/Manulis10" mdate="2023-03-24">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Privacy-preserving admission to mobile peer-to-peer groups.</title>
<pages>111-116</pages>
<year>2010</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PERCOMW.2010.5470612</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2010.5470612</ee>
<crossref>conf/percom/2010w</crossref>
<url>db/conf/percom/percomw2010.html#Manulis10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pet/ManulisPT10" mdate="2018-11-02">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<author pid="08/1183">Gene Tsudik</author>
<title>Taming Big Brother Ambitions: More Privacy for Secret Handshakes.</title>
<pages>149-165</pages>
<year>2010</year>
<booktitle>Privacy Enhancing Technologies</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14527-8_9</ee>
<crossref>conf/pet/2010</crossref>
<url>db/conf/pet/pets2010.html#ManulisPT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/DentFMSS10" mdate="2018-11-02">
<author pid="37/4520">Alexander W. Dent</author>
<author pid="72/5460">Marc Fischlin</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="82/4585">Martijn Stam</author>
<author orcid="0000-0001-6943-8914" pid="52/6199">Dominique Schr&#246;der</author>
<title>Confidential Signatures and Deterministic Signcryption.</title>
<pages>462-479</pages>
<year>2010</year>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-13013-7_27</ee>
<crossref>conf/pkc/2010</crossref>
<url>db/conf/pkc/pkc2010.html#DentFMSS10</url>
</inproceedings>
</r>
<r><incollection key="reference/social/CutilloMS10" mdate="2021-10-14">
<author orcid="0000-0002-2918-083X" pid="88/7813">Leucio Antonio Cutillo</author>
<author pid="62/484">Mark Manulis</author>
<author pid="69/2809">Thorsten Strufe</author>
<title>Security and Privacy in Online Social Networks.</title>
<pages>497-522</pages>
<year>2010</year>
<booktitle>Handbook of Social Network Technologies</booktitle>
<ee>https://doi.org/10.1007/978-1-4419-7142-5_23</ee>
<crossref>reference/social/2010</crossref>
<url>db/reference/social/social2010.html#CutilloMS10</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisP10" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="48/8243">Bertram Poettering</author>
<title>Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.</title>
<pages>659</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/659</ee>
<url>db/journals/iacr/iacr2010.html#ManulisP10</url>
</article>
</r>
<r><article key="journals/ijact/GajekMS09" mdate="2020-08-07">
<author pid="04/3293">Sebastian Gajek</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>User-aware provably secure protocols for browser-based mutual authentication.</title>
<pages>290-308</pages>
<year>2009</year>
<volume>1</volume>
<journal>Int. J. Appl. Cryptogr.</journal>
<number>4</number>
<ee>https://doi.org/10.1504/IJACT.2009.028028</ee>
<url>db/journals/ijact/ijact1.html#GajekMS09</url>
</article>
</r>
<r><article key="journals/tosn/ManulisS09" mdate="2020-05-12">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Security model and framework for information aggregation in sensor networks.</title>
<year>2009</year>
<volume>5</volume>
<journal>ACM Trans. Sens. Networks</journal>
<number>2</number>
<ee>https://doi.org/10.1145/1498915.1498919</ee>
<url>db/journals/tosn/tosn5.html#ManulisS09</url>
<pages>13:1-13:28</pages>
</article>
</r>
<r><inproceedings key="conf/acns/Manulis09" mdate="2019-08-20">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.</title>
<pages>1-19</pages>
<year>2009</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-01957-9_1</ee>
<crossref>conf/acns/2009</crossref>
<url>db/conf/acns/acns2009.html#Manulis09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/BrecherBM09" mdate="2018-11-02">
<author pid="32/7561">Timo Brecher</author>
<author pid="68/2531">Emmanuel Bresson</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Fully Robust Tree-Diffie-Hellman Group Key Exchange.</title>
<pages>478-497</pages>
<year>2009</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10433-6_33</ee>
<crossref>conf/cans/2009</crossref>
<url>db/conf/cans/cans2009.html#BrecherBM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ManulisLKBQ09" mdate="2018-11-06">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="56/1612">Damien Leroy</author>
<author pid="90/3627">Fran&#231;ois Koeune</author>
<author pid="91/2043">Olivier Bonaventure</author>
<author pid="q/JJQuisquater">Jean-Jacques Quisquater</author>
<title>Authenticated wireless roaming via tunnels: making mobile guests feel at home.</title>
<pages>92-103</pages>
<year>2009</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1533057.1533072</ee>
<crossref>conf/ccs/2009asia</crossref>
<url>db/conf/ccs/asiaccs2009.html#ManulisLKBQ09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/conext/LeroyMB09" mdate="2026-02-19">
<author pid="56/1612">Damien Leroy</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="91/2043">Olivier Bonaventure</author>
<title>Enhanced wireless roaming security using three-party authentication and tunnels.</title>
<pages>7-12</pages>
<year>2009</year>
<booktitle>U-NET@CoNEXT</booktitle>
<ee type="oa">https://doi.org/10.1145/1659029.1659032</ee>
<crossref>conf/conext/2009unet</crossref>
<url>db/conf/conext/unet2009.html#LeroyMB09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/GorantlaBNM09" mdate="2018-11-02">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Generic One Round Group Key Exchange in the Standard Model.</title>
<pages>1-15</pages>
<year>2009</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14423-3_1</ee>
<crossref>conf/icisc/2009</crossref>
<url>db/conf/icisc/icisc2009.html#GorantlaBNM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/ManulisSU09" mdate="2019-12-27">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="16/794">Koutarou Suzuki</author>
<author orcid="0000-0002-0411-9389" pid="73/5050">Berkant Ustaoglu</author>
<title>Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.</title>
<pages>16-33</pages>
<year>2009</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14423-3_2</ee>
<crossref>conf/icisc/2009</crossref>
<url>db/conf/icisc/icisc2009.html#ManulisSU09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lisa/CatuognoLMSW09" mdate="2020-03-12">
<author pid="04/3524">Luigi Catuogno</author>
<author pid="02/2549">Hans L&#246;hr</author>
<author pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="82/1691">Marcel Winandy</author>
<title>Transparent Mobile Storage Protection in Trusted Virtual Domains.</title>
<pages>159-172</pages>
<year>2009</year>
<booktitle>LISA</booktitle>
<ee type="oa">http://www.usenix.org/events/lisa09/tech/full_papers/catuogno.pdf</ee>
<crossref>conf/lisa/2009</crossref>
<url>db/conf/lisa/lisa2009.html#CatuognoLMSW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/Manulis09" mdate="2018-11-02">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Securing Remote Access Inside Wireless Mesh Networks.</title>
<pages>324-338</pages>
<year>2009</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10838-9_24</ee>
<crossref>conf/wisa/2009</crossref>
<url>db/conf/wisa/wisa2009.html#Manulis09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBNM09" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<title>Generic One Round Group Key Exchange in the Standard Model.</title>
<pages>514</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/514</ee>
<url>db/journals/iacr/iacr2009.html#GorantlaBNM09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/DentFMSS09" mdate="2020-05-11">
<author pid="37/4520">Alexander W. Dent</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="62/484">Mark Manulis</author>
<author pid="82/4585">Martijn Stam</author>
<author pid="52/6199">Dominique Schr&#246;der</author>
<title>Confidential Signatures and Deterministic Signcryption.</title>
<pages>588</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/588</ee>
<url>db/journals/iacr/iacr2009.html#DentFMSS09</url>
</article>
</r>
<r><article key="journals/iet-ifs/BressonM08" mdate="2020-08-27">
<author pid="68/2531">Emmanuel Bresson</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Contributory group key exchange in the presence of malicious participants.</title>
<pages>85-93</pages>
<year>2008</year>
<volume>2</volume>
<journal>IET Inf. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1049/iet-ifs:20070113</ee>
<url>db/journals/iet-ifs/iet-ifs2.html#BressonM08</url>
</article>
</r>
<r><article key="journals/ijact/BressonM08" mdate="2020-08-07">
<author pid="68/2531">Emmanuel Bresson</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Securing group key exchange against strong corruptions and key registration attacks.</title>
<pages>91-107</pages>
<year>2008</year>
<volume>1</volume>
<journal>Int. J. Appl. Cryptogr.</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJACT.2008.021083</ee>
<url>db/journals/ijact/ijact1.html#BressonM08</url>
</article>
</r>
<r><article key="journals/ijlit/RobertMVLJKKDPBQ08" mdate="2020-09-02">
<author pid="52/7876">Romain Robert</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="49/7874">Florence De Villenfagne</author>
<author pid="56/1612">Damien Leroy</author>
<author pid="09/7880">Julien Jost</author>
<author pid="90/3627">Fran&#231;ois Koeune</author>
<author pid="08/7880">Caroline Ker</author>
<author pid="07/7875">Jean-Marc Dinant</author>
<author pid="89/4666">Yves Poullet</author>
<author pid="91/2043">Olivier Bonaventure</author>
<author pid="q/JJQuisquater">Jean-Jacques Quisquater</author>
<title>WiFi Roaming: Legal Implications and Security Constraints.</title>
<pages>205-241</pages>
<year>2008</year>
<volume>16</volume>
<journal>Int. J. Law Inf. Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.1093/ijlit/ean016</ee>
<url>db/journals/ijlit/ijlit16.html#RobertMVLJKKDPBQ08</url>
</article>
</r>
<r><inproceedings key="conf/acisp/GajekMS08" mdate="2017-05-25">
<author pid="04/3293">Sebastian Gajek</author>
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.</title>
<pages>6-20</pages>
<year>2008</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-540-70500-0_2</ee>
<crossref>conf/acisp/2008</crossref>
<url>db/conf/acisp/acisp2008.html#GajekMS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BressonM08" mdate="2018-11-06">
<author pid="68/2531">Emmanuel Bresson</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Securing group key exchange against strong corruptions.</title>
<pages>249-260</pages>
<year>2008</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1368310.1368347</ee>
<crossref>conf/ccs/2008asia</crossref>
<url>db/conf/ccs/asiaccs2008.html#BressonM08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/GajekMSS08" mdate="2018-11-06">
<author pid="04/3293">Sebastian Gajek</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Provably secure browser-based user-aware mutual authentication over TLS.</title>
<pages>300-311</pages>
<year>2008</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1368310.1368354</ee>
<crossref>conf/ccs/2008asia</crossref>
<url>db/conf/ccs/asiaccs2008.html#GajekMSS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/GajekJMS08" mdate="2019-08-20">
<author pid="04/3293">Sebastian Gajek</author>
<author pid="53/1548">Tibor Jager</author>
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>A Browser-Based Kerberos Authentication Scheme.</title>
<pages>115-129</pages>
<year>2008</year>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-88313-5_8</ee>
<crossref>conf/esorics/2008</crossref>
<url>db/conf/esorics/esorics2008.html#GajekJMS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/ArmknechtELMS08" mdate="2024-10-06">
<author orcid="0009-0003-9935-8095" pid="65/6856">Frederik Armknecht</author>
<author pid="48/1647">Alberto N. Escalante</author>
<author pid="02/2549">Hans L&#246;hr</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.</title>
<pages>29-44</pages>
<year>2008</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-79104-1_3</ee>
<crossref>conf/ispec/2008</crossref>
<url>db/conf/ispec/ispec2008.html#ArmknechtELMS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/ChenLMS08" mdate="2022-04-25">
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="02/2549">Hans L&#246;hr</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Property-Based Attestation without a Trusted Third Party.</title>
<pages>31-46</pages>
<year>2008</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-85886-7_3</ee>
<crossref>conf/isw/2008</crossref>
<url>db/conf/isw/isc2008.html#ChenLMS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/GajekMPSS08" mdate="2017-05-21">
<author pid="04/3293">Sebastian Gajek</author>
<author pid="62/484">Mark Manulis</author>
<author pid="78/1061">Olivier Pereira</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Universally Composable Security Analysis of TLS.</title>
<pages>313-327</pages>
<year>2008</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-540-88733-1_22</ee>
<crossref>conf/provsec/2008</crossref>
<url>db/conf/provsec/provsec2008.html#GajekMPSS08</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/GajekMPSS08" mdate="2020-05-11">
<author pid="04/3293">Sebastian Gajek</author>
<author pid="62/484">Mark Manulis</author>
<author pid="78/1061">Olivier Pereira</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.</title>
<pages>251</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/251</ee>
<url>db/journals/iacr/iacr2008.html#GajekMPSS08</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisLKBQ08" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="56/1612">Damien Leroy</author>
<author pid="90/3627">Fran&#231;ois Koeune</author>
<author pid="91/2043">Olivier Bonaventure</author>
<author pid="q/JJQuisquater">Jean-Jacques Quisquater</author>
<title>Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.</title>
<pages>382</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/382</ee>
<url>db/journals/iacr/iacr2008.html#ManulisLKBQ08</url>
</article>
</r>
<r><phdthesis key="phd/de/Manulis2007" mdate="2021-07-17">
<author pid="62/484">Mark Manulis</author>
<title>Provably secure group key exchange.</title>
<year>2007</year>
<school>Ruhr University Bochum</school>
<pages>1-222</pages>
<isbn>978-3-89966-275-7</isbn>
<ee>https://d-nb.info/985305509</ee>
</phdthesis>
</r>
<r><article key="journals/fgcs/LiaoM07" mdate="2020-02-19">
<author pid="44/3519">Lijun Liao</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Tree-based group key agreement framework for mobile ad-hoc networks.</title>
<pages>787-803</pages>
<year>2007</year>
<volume>23</volume>
<journal>Future Gener. Comput. Syst.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/j.future.2007.01.001</ee>
<url>db/journals/fgcs/fgcs23.html#LiaoM07</url>
</article>
</r>
<r><inproceedings key="conf/atc/BressonM07" mdate="2017-05-25">
<author pid="68/2531">Emmanuel Bresson</author>
<author pid="62/484">Mark Manulis</author>
<title>Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.</title>
<pages>395-409</pages>
<year>2007</year>
<crossref>conf/atc/2007</crossref>
<booktitle>ATC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-73547-2_41</ee>
<url>db/conf/atc/atc2007.html#BressonM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/ChenELMS07" mdate="2022-04-25">
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="48/1647">Alberto N. Escalante</author>
<author pid="02/2549">Hans L&#246;hr</author>
<author pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.</title>
<pages>29-44</pages>
<year>2007</year>
<crossref>conf/fc/2007</crossref>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77366-5_4</ee>
<url>db/conf/fc/fc2007.html#ChenELMS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/ManulisS07" mdate="2017-05-24">
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Provably Secure Framework for Information Aggregation in Sensor Networks.</title>
<pages>603-621</pages>
<year>2007</year>
<crossref>conf/iccsa/2007-1</crossref>
<booktitle>ICCSA (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74472-6_49</ee>
<url>db/conf/iccsa/iccsa2007-1.html#ManulisS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwsec/BressonMS07" mdate="2017-05-24">
<author pid="68/2531">Emmanuel Bresson</author>
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>On Security Models and Compilers for Group Key Exchange Protocols.</title>
<pages>292-307</pages>
<year>2007</year>
<crossref>conf/iwsec/2007</crossref>
<booktitle>IWSEC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-75651-4_20</ee>
<url>db/conf/iwsec/iwsec2007.html#BressonMS07</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisS07" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Provably Secure Framework for Information Aggregation is Sensor Networks.</title>
<pages>283</pages>
<year>2007</year>
<volume>2007</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2007/283</ee>
<url>db/journals/iacr/iacr2007.html#ManulisS07</url>
</article>
</r>
<r><inproceedings key="conf/aina/LiaoM06" mdate="2023-03-24">
<author pid="44/3519">Lijun Liao</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks.</title>
<pages>5-9</pages>
<year>2006</year>
<crossref>conf/aina/2006</crossref>
<booktitle>AINA (2)</booktitle>
<ee>https://doi.org/10.1109/AINA.2006.336</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AINA.2006.336</ee>
<url>db/conf/aina/aina2006.html#LiaoM06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/ManulisS06" mdate="2023-03-24">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Property-Based Taming of Lying Mobile Nodes.</title>
<pages>476-480</pages>
<year>2006</year>
<crossref>conf/aina/2006</crossref>
<booktitle>AINA (2)</booktitle>
<ee>https://doi.org/10.1109/AINA.2006.276</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AINA.2006.276</ee>
<url>db/conf/aina/aina2006.html#ManulisS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/Manulis06" mdate="2018-11-06">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Democratic group signatures: on an example of joint ventures.</title>
<pages>365</pages>
<year>2006</year>
<crossref>conf/ccs/2006</crossref>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1128817.1128882</ee>
<url>db/conf/ccs/ccs2006.html#Manulis06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/ManulisSS06" mdate="2018-11-02">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Linkable Democratic Group Signatures.</title>
<pages>187-201</pages>
<year>2006</year>
<crossref>conf/ispec/2006</crossref>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/11689522_18</ee>
<url>db/conf/ispec/ispec2006.html#ManulisSS06</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ManulisSS06" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Linkable Democratic Group Signatures.</title>
<pages>40</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/040</ee>
<url>db/journals/iacr/iacr2006.html#ManulisSS06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BressonMS06" mdate="2020-05-11">
<author pid="68/2531">Emmanuel Bresson</author>
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>On Security Models and Compilers for Group Key Exchange Protocols.</title>
<pages>385</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/385</ee>
<url>db/journals/iacr/iacr2006.html#BressonMS06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/Manulis06" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<title>Survey on Security Requirements and Models for Group Key Exchange.</title>
<pages>388</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/388</ee>
<url>db/journals/iacr/iacr2006.html#Manulis06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/Manulis06a" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<title>Security-Focused Survey on Group Key Exchange Protocols.</title>
<pages>395</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/395</ee>
<url>db/journals/iacr/iacr2006.html#Manulis06a</url>
</article>
</r>
<r><inproceedings key="conf/icpads/Manulis05" mdate="2023-03-23">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.</title>
<pages>290-294</pages>
<year>2005</year>
<crossref>conf/icpads/2005</crossref>
<booktitle>ICPADS (2)</booktitle>
<ee>https://doi.org/10.1109/ICPADS.2005.177</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPADS.2005.177</ee>
<url>db/conf/icpads/icpads2005-2.html#Manulis05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mass/Manulis05" mdate="2023-03-24">
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Contributory group key agreement protocols, revisited for mobile ad-hoc groups.</title>
<year>2005</year>
<booktitle>MASS</booktitle>
<ee>https://doi.org/10.1109/MAHSS.2005.1542876</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MAHSS.2005.1542876</ee>
<crossref>conf/mass/2005</crossref>
<url>db/conf/mass/mass2005.html#Manulis05</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/Manulis05" mdate="2020-05-11">
<author pid="62/484">Mark Manulis</author>
<title>Democratic Group Signatures on Example of Joint Ventures.</title>
<pages>446</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/446</ee>
<url>db/journals/iacr/iacr2005.html#Manulis05</url>
</article>
</r>
<r><inproceedings key="conf/esas/ManulisS04" mdate="2017-05-21">
<author pid="62/484">Mark Manulis</author>
<author pid="58/5730">J&#246;rg Schwenk</author>
<title>Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.</title>
<pages>107-124</pages>
<ee>https://doi.org/10.1007/978-3-540-30496-8_10</ee>
<year>2004</year>
<crossref>conf/esas/2004</crossref>
<booktitle>ESAS</booktitle>
<url>db/conf/esas/esas2004.html#ManulisS04</url>
</inproceedings>
</r>
<coauthors n="170" nc="2">
<co c="0"><na f="a/Abdalla:Michel" pid="67/2285">Michel Abdalla</na></co>
<co c="0"><na f="a/Alcaraz:Cristina" pid="83/4732">Cristina Alcaraz</na></co>
<co c="0"><na f="a/Armknecht:Frederik" pid="65/6856">Frederik Armknecht</na></co>
<co c="0"><na f="a/Askoxylakis:Ioannis_G=" pid="62/5706">Ioannis G. Askoxylakis</na></co>
<co c="0"><na f="a/Au:Man_Ho" pid="55/24">Man Ho Au</na></co>
<co c="0"><na f="a/Azodi:Amir" pid="133/2363">Amir Azodi</na></co>
<co c="0"><na f="b/Bonacina:Stefano" pid="87/2801">Stefano Bonacina</na></co>
<co c="0"><na f="b/Bonaventure:Olivier" pid="91/2043">Olivier Bonaventure</na></co>
<co c="0"><na f="b/Boureanu:Ioana" pid="12/4955">Ioana Boureanu</na></co>
<co c="0"><na f="b/Boyd:Colin" pid="b/ColinBoyd">Colin Boyd</na></co>
<co c="0"><na f="b/Brecher:Timo" pid="32/7561">Timo Brecher</na></co>
<co c="0"><na f="b/Bresson:Emmanuel" pid="68/2531">Emmanuel Bresson</na></co>
<co c="0"><na f="b/Bridges:Christopher_P=" pid="68/3379">Christopher P. Bridges</na></co>
<co c="0"><na f="b/Briggs:Jo" pid="128/9576">Jo Briggs</na></co>
<co c="0" n="2"><na f="b/Brzuska:Chris" pid="88/5874">Chris Brzuska</na><na>Christina Brzuska</na></co>
<co c="0"><na f="b/Buchmann_0001:Johannes" pid="b/JohannesBuchmann">Johannes Buchmann 0001</na></co>
<co c="0"><na f="c/Caballero:M=" pid="326/7892">M. Caballero</na></co>
<co c="0"><na f="c/Camenisch:Jan" pid="c/JanCamenisch">Jan Camenisch</na></co>
<co c="0"><na f="c/Casey_0001:Matthew" pid="27/7687-1">Matthew Casey 0001</na></co>
<co c="0"><na f="c/Cathalo:Julien" pid="02/1274">Julien Cathalo</na></co>
<co c="0"><na f="c/Catuogno:Luigi" pid="04/3524">Luigi Catuogno</na></co>
<co c="0"><na f="c/Chandrarmouli:K=" pid="326/7400">K. Chandrarmouli</na></co>
<co c="0"><na f="c/Chang_0001:Victor" pid="158/5207">Victor Chang 0001</na></co>
<co c="0"><na f="c/Chen:L=" pid="93/6789">L. Chen</na></co>
<co c="0"><na f="c/Chen_0002:Liqun" pid="22/150-2">Liqun Chen 0002</na></co>
<co c="0"><na f="c/Chevalier:C=eacute=line" pid="61/1937">C&#233;line Chevalier</na></co>
<co c="0"><na f="c/Collomosse:John_P=" pid="72/4504">John P. Collomosse</na></co>
<co c="0"><na f="c/Cooper:Daniel" pid="194/8824">Daniel Cooper</na></co>
<co c="0"><na f="c/Coroiu:M=" pid="326/7843">M. Coroiu</na></co>
<co c="0"><na f="c/Cristofaro:Emiliano_De" pid="36/6225">Emiliano De Cristofaro</na></co>
<co c="0"><na f="c/Cutillo:Leucio_Antonio" pid="88/7813">Leucio Antonio Cutillo</na></co>
<co c="0"><na f="d/Dagdelen:=Ouml=zg=uuml=r" pid="72/8243">&#214;zg&#252;r Dagdelen</na></co>
<co c="0"><na f="d/Davis:Andy" pid="60/920">Andy Davis</na></co>
<co c="0"><na f="d/Denham:Nick" pid="152/5223">Nick Denham</na></co>
<co c="0"><na f="d/Dent:Alexander_W=" pid="37/4520">Alexander W. Dent</na></co>
<co c="0"><na f="d/Detal:Gregory" pid="37/9595">Gregory Detal</na></co>
<co c="0"><na f="d/Dinant:Jean=Marc" pid="07/7875">Jean-Marc Dinant</na></co>
<co c="0"><na f="d/Dounia:T=" pid="326/7451">T. Dounia</na></co>
<co c="0"><na f="d/Dragan:Constantin_Catalin" pid="77/7303">Constantin Catalin Dragan</na></co>
<co c="0"><na f="e/Escalante:Alberto_N=" pid="48/1647">Alberto N. Escalante</na></co>
<co c="1"><na f="f/Fan:Chun=I" pid="34/1432">Chun-I Fan</na></co>
<co c="0"><na f="f/Fischlin:Marc" pid="72/5460">Marc Fischlin</na></co>
<co c="0"><na f="f/Fleischhacker:Nils" pid="78/10700">Nils Fleischhacker</na></co>
<co c="0"><na f="f/Franz:Martin" pid="81/6493">Martin Franz</na></co>
<co c="0"><na f="f/Frymann:Nick" pid="255/5329">Nick Frymann</na></co>
<co c="0"><na f="f/Fuchsbauer:Georg" pid="27/3043">Georg Fuchsbauer</na></co>
<co c="0"><na f="f/Fujioka:Atsushi" pid="77/4040">Atsushi Fujioka</na></co>
<co c="0"><na f="g/Gajek:Sebastian" pid="04/3293">Sebastian Gajek</na></co>
<co c="0"><na f="g/Galindo:David" pid="21/2415">David Galindo</na></co>
<co c="0"><na f="g/Gardham:Daniel" pid="222/6614">Daniel Gardham</na></co>
<co c="0"><na f="g/Giannetsos:Thanassis" pid="96/1667">Thanassis Giannetsos</na></co>
<co c="0"><na f="g/Giannoulakis:Ioannis" pid="18/9638">Ioannis Giannoulakis</na></co>
<co c="0"><na f="g/Gligoric:N=" pid="326/7460">N. Gligoric</na></co>
<co c="0"><na f="g/Gorantla:M=_Choudary" pid="28/2550">M. Choudary Gorantla</na></co>
<co c="0"><na f="g/Gouvas:Panagiotis" pid="67/4413">Panagiotis Gouvas</na></co>
<co c="0"><na f="g/G=uuml=nther_0001:Felix" pid="34/10042">Felix G&#252;nther 0001</na></co>
<co c="0" n="2"><na f="h/Hallman:Roger" pid="169/6354">Roger Hallman</na><na>Roger A. Hallman</na></co>
<co c="0"><na f="h/Harrison:R=" pid="24/4977">R. Harrison</na></co>
<co c="0"><na f="h/Hollick:Matthias" pid="95/1816">Matthias Hollick</na></co>
<co c="1"><na f="h/Hsu:Ruei=Hau" pid="89/936">Ruei-Hau Hsu</na></co>
<co c="0"><na f="h/Huang:Kaibin" pid="21/506">Kaibin Huang</na></co>
<co c="0"><na f="j/Jager:Tibor" pid="53/1548">Tibor Jager</na></co>
<co c="0"><na f="j/Jones:Helen_S=" pid="174/2867">Helen S. Jones</na></co>
<co c="0"><na f="j/Jost:Julien" pid="09/7880">Julien Jost</na></co>
<co c="0"><na f="k/Kafetzakis:Emmanouil" pid="62/1987">Emmanouil Kafetzakis</na></co>
<co c="0"><na f="k/Kasig:T=" pid="326/7715">T. Kasig</na></co>
<co c="0"><na f="k/Kassem:Nada_El" pid="253/1266">Nada El Kassem</na></co>
<co c="0"><na f="k/Katzenbeisser_0001:Stefan" pid="66/3585-1">Stefan Katzenbeisser 0001</na></co>
<co c="0"><na f="k/Kavallieros:Dimitris" pid="238/1084">Dimitris Kavallieros</na></co>
<co c="0"><na f="k/Ker:Caroline" pid="08/7880">Caroline Ker</na></co>
<co c="0"><na f="k/Kiefer:Franziskus" pid="12/10661">Franziskus Kiefer</na></co>
<co c="0"><na f="k/Knapp:Jodie" pid="275/3145">Jodie Knapp</na></co>
<co c="0"><na f="k/Koeune:Fran=ccedil=ois" pid="90/3627">Fran&#231;ois Koeune</na></co>
<co c="0"><na f="k/Koumaras:Vaios" pid="54/9051">Vaios Koumaras</na></co>
<co c="0"><na f="k/Krousarlis:T=" pid="326/7616">T. Krousarlis</na></co>
<co c="0"><na f="k/Kuchta:Veronika" pid="137/5239">Veronika Kuchta</na></co>
<co c="0"><na f="l/Lapidaki:K=" pid="326/7703">K. Lapidaki</na></co>
<co c="0"><na f="l/Lehmann:Anja" pid="63/3592">Anja Lehmann</na></co>
<co c="0"><na f="l/Leroy:Damien" pid="56/1612">Damien Leroy</na></co>
<co c="0"><na f="l/Li_0007:Nan" pid="84/3795-7">Nan Li 0007</na></co>
<co c="0"><na f="l/Li:Shujun" pid="09/6954">Shujun Li</na></co>
<co c="0"><na f="l/Li:Yingjiu" pid="15/2506">Yingjiu Li</na></co>
<co c="0"><na f="l/Liao:Lijun" pid="44/3519">Lijun Liao</na></co>
<co c="0"><na f="l/Libert:Beno=icirc=t" pid="62/1759">Beno&#238;t Libert</na></co>
<co c="0"><na f="l/Liu_0003:Jia" pid="49/1245-3">Jia Liu 0003</na></co>
<co c="0"><na f="l/Liu:Suhui" pid="166/1411">Suhui Liu</na></co>
<co c="0"><na f="l/L=ouml=hr:Hans" pid="02/2549">Hans L&#246;hr</na></co>
<co c="0"><na f="l/L=oacute=pez_0001:Javier" pid="02/3236-1">Javier L&#243;pez 0001</na></co>
<co c="0"><na f="l/Lundberg:Emil" pid="273/4642">Emil Lundberg</na></co>
<co c="0"><na f="m/Maimut:Diana" pid="68/11234">Diana Maimut</na></co>
<co c="0" n="2"><na f="m/Manohar:Arthi_Kanchana" pid="85/8672">Arthi Kanchana Manohar</na><na>Arthi Manohar</na></co>
<co c="0"><na f="m/Marin:S=" pid="326/7655">S. Marin</na></co>
<co c="0"><na f="m/Markakis:A=" pid="326/7622">A. Markakis</na></co>
<co c="0"><na f="m/Menesidou:Sofia=Anna" pid="66/10870">Sofia-Anna Menesidou</na></co>
<co c="0"><na f="m/Meng:L=" pid="29/5461">L. Meng</na></co>
<co c="0"><na f="m/Meng:Long" pid="92/7038">Long Meng</na></co>
<co c="0"><na f="m/Mhiri:S=" pid="326/7687">S. Mhiri</na></co>
<co c="0"><na f="m/Miyaji:Atsuko" pid="20/5513">Atsuko Miyaji</na></co>
<co c="0"><na f="m/Moncur:Wendy" pid="95/2185">Wendy Moncur</na></co>
<co c="0"><na f="n/Nartz:Hugo" pid="348/3825">Hugo Nartz</na></co>
<co c="0"><na f="n/Nati:M=" pid="326/7656">M. Nati</na></co>
<co c="0" n="2"><na f="n/Newton:Christopher_J=_P=" pid="121/5010">Christopher J. P. Newton</na><na>Chris J. P. Newton</na></co>
<co c="-1"><na f="n/Nguyen:J=eacute=r=ocirc=me" pid="368/7149">J&#233;r&#244;me Nguyen</na></co>
<co c="0" n="2"><na f="n/Nieto:Juan_Manuel_Gonz=aacute=lez" pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</na><na>Juanma Gonz&#225;lez Nieto</na></co>
<co c="0"><na f="n/Nifakos:Sokratis" pid="152/3060">Sokratis Nifakos</na></co>
<co c="0"><na f="n/Nilsson:Dain" pid="273/4790">Dain Nilsson</na></co>
<co c="0"><na f="n/Ntafloukas:K=" pid="326/7787">K. Ntafloukas</na></co>
<co c="0" n="2"><na f="n/Ntantogian:Christoforos" pid="86/6966">Christoforos Ntantogian</na><na>Christoforos Dadoyan</na></co>
<co c="0"><na f="o/Onete:Cristina" pid="59/8243">Cristina Onete</na></co>
<co c="0"><na f="o/Oniga:D=" pid="326/7515">D. Oniga</na></co>
<co c="0"><na f="p/Pallas:Frank" pid="06/8643">Frank Pallas</na></co>
<co c="0"><na f="p/Papamartzivanos:Dimitrios" pid="151/5728">Dimitrios Papamartzivanos</na></co>
<co c="0" n="2"><na f="p/Papastergiou:Spyridon" pid="19/6342">Spyridon Papastergiou</na><na>Spyros Papastergiou</na></co>
<co c="0"><na f="p/Pereira:Olivier" pid="78/1061">Olivier Pereira</na></co>
<co c="0"><na f="p/Peter_0001:Andreas" pid="43/8243">Andreas Peter 0001</na></co>
<co c="0"><na f="p/Pieprzyk:Josef" pid="p/JosefPieprzyk">Josef Pieprzyk</na></co>
<co c="0"><na f="p/Pinkas:Benny" pid="31/1735">Benny Pinkas</na></co>
<co c="0"><na f="p/Poettering:Bertram" pid="48/8243">Bertram Poettering</na></co>
<co c="0"><na f="p/Pohle:J=ouml=rg" pid="116/3061">J&#246;rg Pohle</na></co>
<co c="0"><na f="p/Pointcheval:David" pid="p/DPointcheval">David Pointcheval</na></co>
<co c="0"><na f="p/Posegga:Joachim" pid="p/JPosegga">Joachim Posegga</na></co>
<co c="0"><na f="p/Poullet:Yves" pid="89/4666">Yves Poullet</na></co>
<co c="0"><na f="q/Quisquater:Jean=Jacques" pid="q/JJQuisquater">Jean-Jacques Quisquater</na></co>
<co c="0"><na f="r/Radke:Kenneth" pid="85/9240">Kenneth Radke</na></co>
<co c="0"><na f="r/Rangasamy:Jothi" pid="68/9125">Jothi Rangasamy</na></co>
<co c="0" n="2"><na f="r/Reinhardt:Delphine" pid="60/7821">Delphine Reinhardt</na><na>Delphine Christin</na></co>
<co c="0"><na f="r/Robert:Romain" pid="52/7876">Romain Robert</na></co>
<co c="0"><na f="r/Rubio:Juan_E=" pid="204/5226">Juan E. Rubio</na></co>
<co c="0"><na f="s/Sadeghi:Ahmad=Reza" pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</na></co>
<co c="0"><na f="s/Sakkas:Christos" pid="137/6245">Christos Sakkas</na></co>
<co c="0"><na f="s/Sanchez:K=" pid="119/5264">K. Sanchez</na></co>
<co c="0"><na f="s/Sasse:M=_Angela" pid="s/MASasse">M. Angela Sasse</na></co>
<co c="0"><na f="s/Savage:Robin" pid="280/4314">Robin Savage</na></co>
<co c="0"><na f="s/Schneider:Steve_A=" pid="s/SASchneider">Steve A. Schneider</na></co>
<co c="0"><na f="s/Schr=ouml=der:Dominique" pid="52/6199">Dominique Schr&#246;der</na></co>
<co c="0" n="2"><na f="s/Schr=ouml=der:Heike" pid="61/9958">Heike Schr&#246;der</na><na>Heike Busch</na></co>
<co c="0"><na f="s/Schwenk:J=ouml=rg" pid="58/5730">J&#246;rg Schwenk</na></co>
<co c="0"><na f="s/Sekar:Venkkatesh" pid="294/0486">Venkkatesh Sekar</na></co>
<co c="0"><na f="s/Spyros:Arnolnt" pid="246/5637">Arnolnt Spyros</na></co>
<co c="0"><na f="s/Stam:Martijn" pid="82/4585">Martijn Stam</na></co>
<co c="0"><na f="s/Steane:Jamie" pid="161/3175">Jamie Steane</na></co>
<co c="0"><na f="s/Stebila:Douglas" pid="67/675">Douglas Stebila</na></co>
<co c="-1"><na f="s/Steiner:Marion" pid="47/10125">Marion Steiner</na></co>
<co c="0"><na f="s/Stelle:Stanislaus" pid="119/7821">Stanislaus Stelle</na></co>
<co c="0"><na f="s/Stelliou:K=" pid="326/7495">K. Stelliou</na></co>
<co c="0"><na f="s/Strufe:Thorsten" pid="69/2809">Thorsten Strufe</na></co>
<co c="0"><na f="s/St=uuml=ble:Christian" pid="76/3305">Christian St&#252;ble</na></co>
<co c="0"><na f="s/Sun:Dongdong" pid="30/7002">Dongdong Sun</na></co>
<co c="0"><na f="s/Susilo:Willy" pid="12/3447">Willy Susilo</na></co>
<co c="0"><na f="s/Suzuki:Koutarou" pid="16/794">Koutarou Suzuki</na></co>
<co c="0"><na f="t/Tavernarakisv:A=" pid="326/7694">A. Tavernarakisv</na></co>
<co c="0"><na f="t/Teseleanu:George" pid="181/1566">George Teseleanu</na></co>
<co c="0"><na f="t/Tian:Yangguang" pid="188/7576">Yangguang Tian</na></co>
<co c="0"><na f="t/Treharne:Helen" pid="37/5761">Helen Treharne</na></co>
<co c="0"><na f="t/Trujillo:L=" pid="326/7876">L. Trujillo</na></co>
<co c="0"><na f="t/Tsikrika:Theodora" pid="09/2945">Theodora Tsikrika</na></co>
<co c="0"><na f="t/Tsudik:Gene" pid="08/1183">Gene Tsudik</na></co>
<co c="0"><na f="t/Tziouvaras:Athanasios" pid="276/1906">Athanasios Tziouvaras</na></co>
<co c="0"><na f="u/Ustaoglu:Berkant" pid="73/5050">Berkant Ustaoglu</na></co>
<co c="0"><na f="v/Venegas:E=" pid="326/7704">E. Venegas</na></co>
<co c="0"><na f="v/Villenfagne:Florence_De" pid="49/7874">Florence De Villenfagne</na></co>
<co c="0"><na f="v/Vrochidis:Stefanos" pid="44/6029">Stefanos Vrochidis</na></co>
<co c="0"><na f="w/Wang:Yalan" pid="34/7650">Yalan Wang</na></co>
<co c="0"><na f="w/Wang_0074:Yang" pid="181/2842-74">Yang Wang 0074</na></co>
<co c="0"><na f="w/Winandy:Marcel" pid="82/1691">Marcel Winandy</na></co>
<co c="0"><na f="w/Wright:Rebecca_N=" pid="w/RebeccaNWright">Rebecca N. Wright</na></co>
<co c="0"><na f="x/Xydias:D=" pid="326/7732">D. Xydias</na></co>
<co c="0"><na f="y/Yang:Guomin" pid="78/2235">Guomin Yang</na></co>
<co c="0"><na f="y/Yang:Yifan" pid="83/89">Yifan Yang</na></co>
<co c="0"><na f="z/Zhang:Yinghui" pid="31/3845">Yinghui Zhang</na></co>
</coauthors>
</dblpperson>

