Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

71 - 79 out of 79Page size: 10
  1. 2005
  2. Published

    Security Analysis of Cryptographically Controlled Access to XML Documents

    Abadi, M. & Warinschi, B., 2005, Symposium on Principles of Database Systems - PODS 2005. Association for Computing Machinery (ACM), Vol. -. p. 108 - 117 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2004
  4. Published

    Completeness Theorems for the Abadi-Rogaway Logic of Encrypted Expressions

    Micciancio, D. & Warinschi, B., 2004, In : Journal of Computer Security. 12(1), p. 99-129

    Research output: Contribution to journalArticle

  5. Published

    Efficient Blind Signatures without Random Oracles

    Camenisch, J., Koprowski, M. & Warinschi, B., 2004, Security in Communication Networks - SCN 2004. Springer Berlin Heidelberg, Vol. 3352. p. 134-148

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    On the Minimal Assumptions for Group Signatures

    Abdalla, M. & Warinschi, B., 2004, International Conference on Information and Communications Security - ICICS 2004. Springer Berlin Heidelberg, Vol. 3269. p. 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Soundness of Formal Encryption in the Presence of Active Adversaries

    Micciancio, D. & Warinschi, B., 2004, Theory of Cryptography Conference - TCC 2004. Springer Berlin Heidelberg, Vol. 2656. p. 133 - 151 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2003
  9. Published

    Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions

    Bellare, M., Micciancio, D. & Warinschi, B., May 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 614 - 629 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Computational Analysis of the Needham-Schroeder Protocol

    Warinschi, B., 2003, Proceedings of 16th Computer Science Foundation Workshop. IEEE Computer Society, Vol. -. p. 248-260

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Foundations for Group Signatures: Simplified Requirements and a Construction Based on General Assumptions

    Bellare, M., Micciancio, D. & Warinschi, B., 2003, Advances in cryptology - {EUROCRYPT} 2003.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2001
  13. Published

    A Linear Space Algorithm for Computing the Hermite Normal Form

    Micciancio, D. & Warinschi, B., 2001, International Symposium on Symbolic and Algebraic Computation, ISSAC - 2001. Association for Computing Machinery (ACM), p. 231-236 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 Next