Prof. Dr.-Ing. Mark Manulis

  • Former Assistant - Chair Network and Data Security
Email:
mark.manulis@rub.de

Research

None

Projects

None

Publications

2010
Trusted Virtual Domains: Color Your Network

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy - Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298.

2008
A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk - ESORICS 2008

Property-Based Attestation without a Trusted Third Party

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, - Information Security Conference (ISC'08), 2008.

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante - Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - Accepted for ASIACCS'08.

Securing Email Communication with XML Technology

Jörg Schwenk, Lijun Liao, Mark Manulis, - "Handbook of Research on Information Security and Assurance", to be published in August 2008 by Information Science Reference.

Universally Composable Security Analysis of TLS

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira - Accepted for the Second Confer­ence on Provable Security (ProvSec), 2008.

2007
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante - 11th International Conference on Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, volume 4886 of Lecture Notes on Computer Sience (LNCS), pages 29-44. Springer Verlag, 2007.

Browser Models for Usable Authentication Protocols

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - Presented at the Workshop on Web 2.0 Security and Privacy (W2SP 2007) held in conjunction with the IEEE Symposium on Security and Privacy, Oakland, California, May 24, 2007.

Browser Models for Usable Authentication Protocols.

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, - accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

Mark Manulis, Emmanuel Bresson - In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), 11-13 July, Hong Kong, China.

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

Mark Manulis, Emmanuel Bresson - In Proceedings of the International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), Wroclaw (Poland), 2007.

On Security Models and Compilers for Group Key Exchange Protocols.

Jörg Schwenk, Mark Manulis, Emmanuel Bresson - In Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara (Japan), 2007.

Provably Secure Framework for Information Aggregation in Sensor Networks.

Jörg Schwenk, Mark Manulis, - In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur (Malaysia), 2007 .

Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks

Lijun Liao, Mark Manulis, - in Future Generation Computer Systems (FGCS), 23(6):787-803, 2007, Elsevier.

2006
Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.

Mark Manulis, - in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), 21-24 March, Taipei, Taiwan.

Key Agreement for Heterogeneous Ad-Hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis, - to appear in International Journal of Wireless and Mobile Computing (IJWMC), Inderscience.

Key Agreement for Heterogenous Mobile Ad-hoc Groups

Ahmad-Reza Sadeghi, Mark Manulis, - To appear in Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing) Journal.

Linkable Democratic Group Signatures

Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis, - Accepted for 2nd Information Security Practice and Experience Conference (ISPEC 2006), 11.-14. April, Hangzhou, China.

Property-based Taming Lying Mobile Nodes

Ahmad-Reza Sadeghi, Mark Manulis, - Accepted for International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) at 20th IEEE International ­Conference on Advanced Information Networking and Applications (AINA 2006), 18.-20. April, Vienna, Austria.

Property-Based Taming of Lying Mobile Nodes.

Ahmad-Reza Sadeghi, Mark Manulis, - in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria.

Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.

Lijun Liao, Mark Manulis, - in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria.

2005
Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

Mark Manulis, - in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), 07-10 November 2005, Washington, USA.

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

Mark Manulis, - in Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Volume 2, International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290-294. IEEE Computer Society, 2005.

2004
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

Jörg Schwenk, Mark Manulis, - In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005.