Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

41 - 50 out of 79Page size: 10
  1. 2011
  2. Published

    Security for Key Management Interfaces

    Kremer, S., Steel, G. & Warinschi, B., 2011, Computer Security Foundations Symposium - CSF 2011 . IEEE Computer Society, Vol. -. p. 266-280 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Security of the Enhanced TCG Privacy-CA Solution

    Chen, L., Lee, M-F. & Warinschi, B., 2011, Trustworthy Global Computing - TGC 2011. Springer Berlin Heidelberg, Vol. 7173. p. 121-141 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2010
  5. Published

    The TLS Handshake Protocol: A Modular Analysis

    Morrissey, P., Smart, N. & Warinschi, B., Apr 2010, In : Journal of Cryptology. 23, 2, p. 187-223 37 p.

    Research output: Contribution to journalArticle

  6. Published

    Get Shorty via Group Signatures without Encryption

    Bichsel, P., Camenisch, J., Neven, G., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 381-398

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Groth–Sahai Proofs Revisited

    Ghadafi, E., Smart, N. & Warinschi, B., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 177-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Guessing Attacks and the Computational Soundness of Static Equivalence

    Baudet, M., Warinschi, B. & Abadi, M., 2010, In : Journal of Computer Security. 18, 5, p. 909-968 60 p.

    Research output: Contribution to journalArticle

  9. Published

    Robustness Guarantees for Anonymity

    Barthe, G., Hevia, A., Luo, Z., Rezk, T. & Warinschi, B., 2010, IEEE Computer Security Foundations Symposium - CSF 2010. IEEE Computer Society, Vol. -. p. 91-106

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Security of the TCG Privacy-CA Solution

    Chen, L. & Warinschi, B., 2010, Embedded and Ubiquitous Computing - EUC 2010. IEEE Computer Society, Vol. -. p. 609-616 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The Fiat–Shamir Transform for Group and Ring Signature Schemes

    Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2009
  13. Published

    Certified Encryption Revisited

    Farshim, P. & Warinschi, B., 2009, Progress in Cryptology - AFRICACRYPT 2009. Springer Berlin Heidelberg, Vol. 5580. p. 179-197

    Research output: Chapter in Book/Report/Conference proceedingConference contribution