Adams, M. D., Keep, A. W.
, Midtgaard, J., Might, M., Chauhan, A. & Dybvig, R. K. (2011).
Flow-sensitive type recovery in linear-log time. I
Proceedings of the 2011 ACM international Conference on Object Oriented Programming Systems Languages and Applications: OOPSLA '11 (s. 483-498). Association for Computing Machinery.
https://doi.org/10.1145/2048066.2048105
Ackerman, M., Ben-David, S.
, Branzei, S. & Loker, D. (2012).
Weighted Clustering. I
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (s. 858-863). AAAI Press.
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. I D. Hofheinz & A. Rosen (red.),
Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings (Bind Part 1, s. 471-501). Springer.
https://doi.org/10.1007/978-3-030-36030-6_19
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Bind III, s. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Abspoel, M., Dalskov, A.
, Escudero Ospina, D. E. & Nof, A. (2021).
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. I K. Sako & N. O. Tippenhauer (red.),
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Bind II, s. 122-154). Springer.
https://doi.org/10.1007/978-3-030-78375-4_6
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Afhandling præsenteret på Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Abel, P., Fox, M., Potts, R., Hemment, D., Thomson, C., Gajdos, P., Li, S., Vazquez, A. D., Barraclough, R., Schliwa, G., Lindley, J., Turner, S., Devitt, J., MacDonald, J., Lee, A., Trueblood, C., Maxwell, D., Mehrpouya, H., Woods, M. ... Monsen, K. (2015).
Re-writing the City: Negotiating and Reflecting on Data Streams.
https://doi.org/10.1145/2783446.2783562
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Artikel e17.
https://doi.org/10.1017/S0956796820000155
Abe, M., Chase, M.
, David, B., Kohlweiss, M., Nishimaki, R. & Ohkubo, M. (2016).
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Journal of Cryptology,
29(4), 1-46.
https://doi.org/10.1007/s00145-015-9211-7
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Abdrabou, Y., Schütte, J., Shams, A.
, Pfeuffer, K., Buschek, D., Khamis, M. & Alt, F. (2022).
"Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics. I
CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Artikel 400 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3517531
Abdrabou, Y., Mecke, L., Rivu, R., Prange, S., Nguyen, Q. D., Voigt, V., Alt, F.
& Pfeuffer, K. (2023).
How Unique do we Move? Understanding the Human Body and Context Factors for User Identification. I M. Stolze, F. Loch, M. Baldauf, F. Alt, C. Schneegass, T. Kosch, T. Hirzle, S. Sadeghian, F. Draxler, K. Bektas, K. Lohan & P. Knierim (red.),
Proceedings of Mensch Und Computer 2023 (s. 127-137). Association for Computing Machinery.
https://doi.org/10.1145/3603555.3603574
Abdolmaleki, B.
, Khoshakhlagh, H. & Lipmaa, H. (2021).
Smooth Zero-Knowledge Hash Functions. I A. Adhikari, R. Küsters & B. Preneel (red.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (s. 510-535). Springer.
https://doi.org/10.1007/978-3-030-92518-5_23
Abboud, A., Backurs, A.
, Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. I
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery.
Abate, C.
, Haselwarter, P. G., Rivas, E., Muylder, A. V., Winterhalter, T., Hriţcu, C., Maillard, K.
& Spitters, B. (2021).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. I
Proceedings - 2021 IEEE 34th Computer Security Foundations Symposium, CSF 2021 IEEE.
https://doi.org/10.1109/CSF51468.2021.00048
Abate, C.
, Haselwarter, P. G., Rivas, E., Muylder, A. V., Winterhalter, T., Hritcu, C., Maillard, K.
& Spitters, B. (2021).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. (s. 397). Cryptology ePrint Archive.
https://eprint.iacr.org/2021/397
Abam, M. A., Daneshpajouh, S.
, Deleuran, L., Ehsani, S. & Ghodsi, M. (2014).
Computing homotopic line simplification.
Computational Geometry,
47(7), 728-739.
https://doi.org/10.1016/j.comgeo.2014.02.002