Dr Mark Manulis
Senior Lecturer
Qualifications: Dipl.-Inform. M.Sc. (2003) Dr.-Ing. with distinction (2007)
Email: m.manulis@surrey.ac.uk
Phone: Work: 01483 68 3911
Room no: 34 BB 02
Further information
Biography
Dr Mark Manulis is Associate Professor (Senior Lecturer) at the Department of Computing of the University of Surrey.
Prior to this appointment he served as Assistant Professor (Juniorprofessor) at the Department of Computer Science of the Technische Universität Darmstadt, where he continues heading the Cryptographic Protocols Group. As Principal Investigator he is further associated with the Center for Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE).
Mark obtained his PhD in the area of cryptography and information security from the Ruhr-Universität Bochum and spent his post-doc time with the UCL Crypto Group at the Microelectronics Laboratory of the Université catholique de Louvain. He holds Dipl.-Inform. and M.Sc. degrees in computer science from the Technische Universität Braunschweig.
Mark serves on program committees of international conferences and workshops in information security and cryptography. He is general chair of CANS 2012, general co-chair of PKC 2012, and is involved in editorial boards of Elsevier's COMCOM and ISTR journals.
Mark's research interests include authentication and key management, anonymity and privacy, design and formal analysis of cryptographic protocols, network security, security in distributed systems, wireless networks, and user-centric security.
Please refer for full information to his personal academic website: www.manulis.eu
Publications
Journal articles
- . (2011) 'Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols'. ACM ACM Transactions on Information and Systems Security (TISSEC), 14 (4) Article number 28
- . (2011) 'SWISH: Secure WiFi sharing'. Elsevier Computer Networks, 55 (7), pp. 1614-1630.
- . (2010) 'Trusted Virtual Domains: Color Your Network'. Springer Datenschutz und Datensicherheit (DuD), 34 (5), pp. 289-294.
- . (2010) 'Key Agreement for Heterogeneous Mobile Ad-Hoc Groups'. Inderscience International Journal of Wireless and Mobile Computing (IJWMC), 4 (1), pp. 17-30.
- . (2009) 'User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication'. Inderscience International Journal of Applied Cryptography (IJACT), 1 (4), pp. 290-308.
- . (2009) 'Security Model and Framework for Information Aggregation in Sensor Networks'. ACM ACM Transactions on Sensor Networks (TOSN), 5 (2) Article number 13
- . (2008) 'Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks'. Inderscience International Journal of Applied Cryptography (IJACT), 1 (2), pp. 91-107.
- . (2008) 'Contributory Group Key Exchange in the Presence of Malicious Participants'. IET IET Information Security, 2 (3), pp. 85-93.
- .
(2008) 'WiFi Roaming: Legal Implications and Security Constraints'. Oxford University Press International Journal of Law and Information Technology, 16 (3), pp. 205-241.doi: 10.1093/ijlit/ean016
- . (2007) 'Tree-based group key agreement framework for mobile ad-hoc networks'. Future Generation Computer Systems, 23 (6), pp. 787-803.
Conference papers
- . 'Group Signature with Constant Revocation Costs for Signers and Verifiers'. Springer Lecture Notes in Computer Science: Cryptology and Network Security, Sanya, China: 10th CANS 2011 7092, pp. 214-233.
- . 'UPBA: User-Authenticated Property-Based Attestation'. IEEE Proceedings of 9th Annual International Conference on Privacy, Security and Trust, Montreal, Canada: 9th PST 2011, pp. 112-119.
- . 'Key Management in Distributed Online Social Networks'. IEEE Proceedings of 2011 IEEE International Symposium on a World of Wireless, Mobile, and Multimedia Networks, Tuscany, Italy: 12th IEEE WOWMOM 2011, pp. 1-7.
- . 'Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security'. Springer Lecture Notes in Computer Science: Advances in Cryptology – ASIACRYPT 2011, Seoul, South Korea: 17th International Conference on the Theory and Application of Cryptology and Information Security 7073, pp. 468-485.
- . (2011) 'Private Discovery of Common Social Contacts'. Springer 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), pp. 147-165.
- . (2011) 'Cryptographic Treatment of Private User Profiles'. 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS,
- . (2011) 'Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation'. ACM ASIACCS 2011, , pp. 286-295.
- . (2011) 'Affiliation-Hiding Authentication with Minimal Bandwidth Consumption'. Springer 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011), pp. 85-99.
- . (2010) 'Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys'. Springer AFRICACRYPT 2010, 6055, pp. 351-368.
- . (2010) 'Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions'. Springer AFRICACRYPT 2010, 6055, pp. 333-350.
- . (2010) 'Confidential Signatures and Deterministic Signcryption'. Springer 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), 6056, pp. 462-479.
- . (2010) 'Security and Privacy Objectives for Sensing Applications in Wireless Community Networks'. IEEE Computer Society Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN 2010), , pp. 1-6.
- . (2010) 'Taming Big Brother Ambitions: More Privacy for Secret Handshakes'. Privacy Enhancing Technologies, , pp. 149-165.
- . (2010) 'Privacy-Preserving Group Discovery with Linear Complexity'. Applied Cryptography and Network Security (ACNS 2010), , pp. 420-437.
- . (2010) 'Privacy-Preserving Admission to Mobile Peer-to-Peer Groups'. IEEE Computer Society 8th IEEE International Conference on Pervasive Computing and Communications (PerCom 2010), , pp. 111-116.
- . (2010) 'Affiliation-Hiding Key Exchange with Untrusted Group Authorities'. Applied Cryptography and Network Security (ACNS 2010), , pp. 402-419.
- . (2010) 'Redactable Signatures for Tree-Structured Data: Definitions and Constructions'. Applied Cryptography and Network Security (ACNS 2010), , pp. 87-104.
- .
(2009) 'Fully Robust Tree-Diffie-Hellman Group Key Exchange'. Springer Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009), Kanazawa, Ishikawa, Japan: Cryptology and Network Security, 8th International Conference LNCS 5888, pp. 478-497.Full text is available at: http://epubs.surrey.ac.uk/755177/
- .
(2009) 'Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys'. Springer-Verlag Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009), Paris-Rocquencourt, France: Applied Cryptography and Network Security: 7th International Conference LNCS 5536, pp. 1-19.Full text is available at: http://epubs.surrey.ac.uk/755179/
- . (2009) 'Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels'. ACM Press Proceedings of the 1st ACM workshop on User-provided Networking (U-Net), CoNEXT 2009, , pp. 7-12.
- . (2009) 'Transparent Mobile Storage Protection in Trusted Virtual Domains'. USENIX Association 23rd USENIX Large Installation Systems Administration Conference (LISA 2009), , pp. 159-172.
- . (2009) 'Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home'. ACM Press Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS’09), , pp. 92-103.
- . (2009) 'Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange'. Springer 12th International Conference on Information, Security, and Cryptology (ICISC 2009), 5984, pp. 16-33.
- . (2009) 'Generic One Round Group Key Exchange in the Standard Model'. Springer 12th International Conference on Information, Security, and Cryptology (ICISC 2009), 5984, pp. 1-15.
- . (2009) 'Securing Remote Access Inside Wireless Mesh Networks'. Springer-Verlag Proceedings of the 10th International Workshop on Information Security and Applications (WISA 2009), 5932, pp. 324-338.
- . (2008) 'Property-Based Attestation without a Trusted Third Party'. Springer Information Security, 11th International Conference, ISC 2008, 5222, pp. 31-46.
- . (2008) 'A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting'. Springer-Verlag Financial Cryptography and Data Security, 11th International Conference, FC 2007, 4886, pp. 29-44.
- . (2008) 'Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly'. Springer Information Security Practice and Experience, 4th International Conference, ISPEC 2008, 4991, pp. 29-44.
- . (2008) 'Universally Composable Security Analysis of TLS.'. Springer Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), 5324, pp. 313-327.
- . (2008) 'Provably Secure Browser-Based User-Aware Mutual Authentication over TLS'. ACM Press Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS’08), , pp. 300-311.
- . (2008) 'A Browser-Based Kerberos Authentication Scheme'. Springer Proceedings of 13th European Symposium on Research in Computer Security (ESORICS 2008), 5283, pp. 115-129.
- . (2008) 'Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy'. Springer Proceedings of 13th Australasian Conference on Information Security and Privacy (ACISP 2008), 5107, pp. 6-20-6-20.
- . (2008) 'Securing Group Key Exchange against Strong Corruptions'. ACM Press Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS’08), , pp. 249-260.
- .
(2007) 'On Security Models and Compilers for Group Key Exchange Protocols'. Springer-Verlag Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara, Japan: Advances in Information and Computer Security, 2nd Intl. Workshop on Security LNCS 4752, pp. 292-307.Full text is available at: http://epubs.surrey.ac.uk/755182/
- . (2007) 'Provably Secure Framework for Information Aggregation in Sensor Networks'. Springer Computational Science and Its Applications - ICCSA 2007, Part I, 4705, pp. 603-621.
- . (2007) 'Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust'. Springer-Verlag Proceedings of the 4th Autonomic and Trusted Computing Conference (ATC 2007), Hong Kong, China: 4th International Conference, ATC 2007 LNCS 4610, pp. 395-409.
- . (2006) 'Linkable Democratic Group Signatures'. Springer-Verlag Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), 3903, pp. 187-201.
- . (2006) 'Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks'. IEEE Computer Society Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vol. 2, , pp. 5-9.
- . (2006) 'Democratic Group Signatures - On an Example of Joint Ventures'. ACM Press Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), , pp. 365-365.
- . (2006) 'Property-Based Taming of Lying Mobile Nodes'. IEEE Computer Society Proceedings of 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vol. 2, , pp. 476-480.
- . (2005) 'Key Agreement for Heterogeneous Mobile Ad-Hoc Groups'. IEEE Computer Society Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Vol. 2, , pp. 290-294.
- . (2005) 'Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups'. IEEE Computer Society Proceedings of 2nd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), , pp. 811-818.
- . (2004) 'Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH'. Springer ESAS, 3313, pp. 107-124.
Books
- . (2007) Provably Secure Group Key Exchange. Berlin, Bochum, Dülmen, London, Paris : Europäischer Universitätsverlag 5
Book chapters
- . (2010) 'Security and Privacy in Online Social Networks'. in Furht B (ed.) Handbook of Social Network Technologies and Applications Springer-Verlag New York Inc Article number 23
- . (2008) 'Securing Email Communication with XML Technology'. in Gupta JND, Sharma S (eds.) Handbook of Research on Information Security and Assurance IGI Global Article number XVII , pp. 202-217.
Patents
- . (2008) Method, Authentication Server and Service Server for Authenticating a Client.
Reports
- . (2008) Survey on Security Requirements and Models for Group Key Exchange. Article number 2006/02
- . (2006) Security-Focused Survey on Group Key Exchange Protocols. Article number 2006/03
Teaching
Year 2012/2013- Semester 1: COM2031 | Advanced Algorithms
- Semester 2: COMM036 | Web Hacking Countermeasures
- Semester 2: COM2027 | Software Engineering Project
Departmental Duties
- Director of MSc Studies (incl. MSc Information Systems, MSc Internet Computing, MSc Security Technologies and Applications)
- Marketing Coordinator of the Department of Computing
