Manulis, Mark
77  Ergebnisse:
Personensuche X
?
2

Fully Homomorphic Encryption Beyond IND-CCA1 Security: Inte..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024,
Manulis, Mark ; Nguyen, Jérôme - p. 63-93 , 2024
 
?
 
?
5

Asynchronous Remote Key Generation for Post-Quantum Cryptos..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Frymann, Nick ; Gardham, Daniel ; Manulis, Mark - p. 928-941 , 2023
 
?
6

Generalised Asynchronous Remote Key Generation for Pairing-..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Frymann, Nick ; Gardham, Daniel ; Manulis, Mark. - p. 394-421 , 2023
 
?
7

Revocable Hierarchical Attribute-Based Signatures from Latt..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Gardham, Daniel ; Manulis, Mark - p. 459-479 , 2022
 
?
8

Unlinkable Delegation of WebAuthn Credentials:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Frymann, Nick ; Gardham, Daniel ; Manulis, Mark - p. 125-144 , 2022
 
?
9

TAPESTRY: A De-Centralized Service for Trusted Interaction ..:

Yang, Yifan ; Cooper, Daniel ; Collomosse, John...
IEEE Transactions on Services Computing.  15 (2022)  3 - p. 1385-1398 , 2022
 
?
10

Biometric-Authenticated Searchable Encryption:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
11

KYChain : user-controlled KYC data sharing and certifica..:

, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing,
 
?
12

Password-authenticated searchable encryption:

Chen, Liqun ; Huang, Kaibin ; Manulis, Mark.
International Journal of Information Security.  20 (2020)  5 - p. 675-693 , 2020
 
?
13

Asynchronous Remote Key Generation : An Analysis of Yubi..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Frymann, Nick ; Gardham, Daniel ; Kiefer, Franziskus... - p. 939-954 , 2020
 
?
14

An Interoperable Architecture for Usable Password-Less Auth..:

, In: Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication,
 
1-15