Filos-Ratsikas, A., Stiil Frederiksen, S. K., Goldberg, P. W. & Zhang, J. (2018).
Hardness results for consensus-halving. I I. Potapov, J. Worrell & P. Spirakis (red.),
43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Bind 117). Artikel 24 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2018.24
Fetzer, V., Müller-Quade, J.
& Nilges, T. (2016).
A Formal Treatment of Privacy in Video Data. I I. Askoxylakis, S. Ioannidis, S. Katsikas & C. Meadows (red.),
Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings (Bind 9879, s. 406-424). Springer VS.
https://doi.org/10.1007/978-3-319-45741-3_21
Feldthaus, A., Millstein, T.
, Møller, A., Schäfer, M. & Tip, F. (2011).
Refactoring towards the good parts of JavaScript. Poster session præsenteret på SPLASH 2011, Portland, Oregon, USA.
https://doi.org/10.1145/2048147.2048200
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013).
Efficient construction of approximate call graphs for JavaScript IDE services. I D. Notkin, B. H. C. Cheng & K. Pohl (red.),
Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (s. 752-761 ). IEEE Communications Society.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Fechete, L. I., Larking, A. C., Heslop, A., Hannaford, R., Anderson, C. B., Hong, W., Prakash, S., Mace, W., Alikhani, S., Hofmann, R. W.
, Tausen, M., Schierup, M. H., Andersen, S. U. & Griffiths, A. G. (2024).
Harnessing cold adaptation for postglacial colonisation: Galactinol synthase expression and raffinose accumulation in a polyploid and its progenitors.
Plant, Cell & Environment. Advance online publication.
https://doi.org/10.1111/pce.15009
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. I F. V. Fomin (red.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (s. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Faust, S., Mukherjee, P., Venturi, D. & Wichs, D. (2014).
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. I P. Q. Nguyen & E. Oswald (red.),
Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (s. 111-128 ). Springer.
https://doi.org/10.1007/978-3-642-55220-5_7
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1
Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. I M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (red.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Bind Part 1, s. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32