Hermanns, J., Skitsas, K., Tsitsulin, A., Munkhoeva, M., Kyster, A., Nielsen, S., Bronstein, A. M.
, Mottin, D. & Karras, P. (2023).
GRASP: Scalable Graph Alignment by Spectral Corresponding Functions.
ACM Transactions on Knowledge Discovery from Data,
17(4), 1-26. Artikel 50.
https://doi.org/10.1145/3561058
Heljanko, K., Junttila, T. A., Keinänen, M.
, Lange, M. & Latvala, T. (2006).
Bounded Model Checking for Weak Alternating Büchi Automata. I T. Ball & R. B. Jones (red.),
CAV ´06: Computer Aided Verification, 18th International Conference (s. 95-108)
https://doi.org/10.1007/11817963_12
Hein, J.
, Wiuf, C., Møller, M., Knudsen, B. & Wibling, G. (2000).
Statistical alignment: computational properties, homology testing and goodness-of-fit.
J. Mol. Biol.,
302(1), 265-279.
https://doi.org/10.1006/jmbi.2000.4061
Hedin, G., Magnusson, B., Fors, D. S., Robertz, S.
, Gjerlufsen, T. & Andersen, P. (2007).
PalCom Deliverable 49 (2.6.3). Support for End-User Composition in PalCom.
http://www.ist-palcom.org/publications/deliverables/Deliverable-49-[2.6.3]-end-user-composition.pdf
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Hazay, C., López-Alt, A., Wee, H.
& Wichs, D. (2013).
Leakage-resilient cryptography from minimal assumptions. I T. Johansson & P. Nguyen (red.),
Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 160-176). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_10
Haselwarter, P. G., Rivas, E., Van Muylder, A., Winterhalter, T., Abate, C.
, Sidorenco, N., Hriţcu, C., Maillard, K.
& Spitters, B. (2023).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq.
ACM Transactions on Programming Languages and Systems,
45(3), 61. Artikel 15.
https://doi.org/10.1145/3594735
Haselwarter, P. G., Hvass, B. S., Hansen, L. L., Winterhalter, T., Hriţcu, C.
& Spitters, B. (2024).
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. I A. Timany, D. Traytel, B. Pientka & S. Blazy (red.),
CPP 2024: Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs (s. 30-44). Association for Computing Machinery.
https://doi.org/10.1145/3636501.3636961
Hansen, K. M., MacIntyre, B., Mynatt, E. D., Tullio, J. & Voida, S. (2001).
Hypermedia in the Kimura System: Using Spacial, Temporal and Navigational Relationships to Support Multitasking and Background Awareness. I
Proceedings of the twelfth ACM Conference on Hypertext and Hypermedia (Bind Posters). ACM Press New York, NY, USA.