Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

21 - 30 out of 79Page size: 10
  1. 2015
  2. Published

    SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

    Bernhard, D., Cortier, V., Galindo, D., Pereira, O. & Warinschi, B., 2015, 2015 IEEE Symposium on Security and Privacy - S&P 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 499-516 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2014
  4. Published

    Anonymity guarantees of the UMTS/LTE authentication and connection protocol

    Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

    Research output: Contribution to journalArticle

  5. Published

    Cryptographic puzzles and DoS resilience, revisited.

    Groza, B. & Warinschi, B., 2014, In : Designs, Codes and Cryptography. 73, 1, p. 177-207 31 p.

    Research output: Contribution to journalArticle

  6. Published

    Homomorphic Signatures with Efficient Verification for Polynomial Functions.

    Catalano, D., Fiore, D. & Warinschi, B., 2014, Advances in Cryptology - CRYPTO 2014. Springer Berlin Heidelberg, Vol. 8617. p. 371-389 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 2013
  8. Published

    An Analysis of the EMV Channel Establishment Protocol

    Brzuska, C., Smart, N. P., Warinschi, B. & Watson, G., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 373-386

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Deduction Soundness: Prove One, Get Five for Free

    Bohl, F., Cortier, V. & Warinschi, B., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 1261-1272

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Cryptographic Voting - A Gentle Introduction.

    Bernhard, D. & Warinschi, B., 2013, Foundations of Security Analysis and Design VII - FOSAD 2012/2013. Springer, Vol. 8604. p. 167-211 45 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Cryptographically Enforced RBAC

    Ferrara, A-L., Fuchsbauer, G. & Warinschi, B., 2013, IEEE CSF 2013. Computer Security Foundations Symposium - CSF 2013: IEEE Computer Society, p. 115 129 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Less is more: relaxed yet composable security notions for key exchange

    Brzuska, C., Fischlin, M., Smart, N. P., Warinschi, B. & Williams, S. C., 2013, In : International Journal of Information Security. 12, p. 267-297

    Research output: Contribution to journalArticle

  13. 2012
  14. Published

    Secure Proxy Signatures Schemes for Delegation of Signing Rights

    Alexandra, B., Adriana, P. & Warinschi, B., Jan 2012, In : Journal of Cryptology. 25, 1, p. 57-115 59 p.

    Research output: Contribution to journalArticle