Gjerlufsen, T., Klokmose, C. N., Eagan, J., Pillias, C. & Beaudouin-Lafon, M. (2011).
Shared Substance: Developing Flexible Multi-Surface Applications. I D. S. Ten, S. Amershi, B. Begole, W. A. Kellogg & M. Tungare (red.),
Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011 (s. 3383-3392). Association for Computing Machinery.
https://doi.org/10.1145/1978942.1979446
Gilbert, S., Porat, E., King, V., Saia, J.
, Pettie, S. & Young, M. (2014).
(Near) optimal resource-competitive broadcast with jamming. I G. Blelloch & P. Sanders (red.),
Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '14 (s. 257-266). Association for Computing Machinery.
https://doi.org/10.1145/2612669.2612679
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Artikel 114.
https://doi.org/10.1145/3408996
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. I A. Boldyreva & D. Micciancio (red.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Georgiev, I., Křivánek, J.
, Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013).
Joint importance sampling of low-order volumetric scattering.
A C M Transactions on Graphics, (6), Artikel 164 .
https://doi.org/10.1145/2508363.2508411
Georgiadis, L.
, Hansen, T. D., Italiano, G. F., Krinninger, S. & Parotsidis, N. (2017).
Decremental Data Structures for Connectivity and Dominators in Directed Graphs. I I. Chatzigiannakis, P. Indyk, F. Kuhn & A. Muscholl (red.),
44th International Colloquium on Automata, Languages, and Programming (ICALP 2017) (Bind 80, s. 42:1-42:15). Artikel 42 Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH.
https://doi.org/10.4230/LIPIcs.ICALP.2017.42
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Huyghebaert, S., Devriese, D.
& Birkedal, L. (2021).
Efficient and provable local capability revocation using uninitialized capabilities.
Proceedings of the ACM on Programming Languages ,
5(POPL), Artikel 6.
https://doi.org/10.1145/3434287
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Devriese, D.
& Birkedal, L. (2021).
Cap’ ou pas cap’ ?: Preuve de programmes pour une machine à capacités en présence de code inconnu. I
Journées Francophones des Langages Applicatifs 2021 Institut de Recherche en Informatique Fondamentale.
https://researchportal.vub.be/en/publications/cap-ou-pas-cap-preuve-de-programmes-pour-une-machine-%C3%A0-capacit%C3%A9s-
Georges, A. L., Guéneau, A., Van Strydonck, T.
, Timany, A., Trieu, A., Devriese, D.
& Birkedal, L. (2024).
Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code.
Journal of the ACM,
71(1), Artikel 3.
https://doi.org/10.1145/3623510
Gentry, C., Halevi, S., Krawczyk, H.
, Magri, B., Nielsen, J. B., Rabin, T.
& Yakoubov, S. (2021).
YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. I T. Malkin & C. Peikert (red.),
Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (s. 64-93). Springer.
https://doi.org/10.1007/978-3-030-84245-1_3
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Gasiunas, V., Mezini, M.
& Ostermann, K. (2007).
Dependent Classes. I R. P. Gabriel (red.),
Conference on Object Oriented Programming Systems Languages and Applications: Proceedings of the 22nd annual ACM SIGPLAN conference on Object oriented programming systems and applications (s. 133-152). Association for Computing Machinery.
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Ganesh, C.
, Magri, B. & Venturi, D. (2020).
Cryptographic reverse firewalls for interactive proof systems. I A. Czumaj, A. Dawar & E. Merelli (red.),
47th International Colloquium on Automata, Languages, and Programming, ICALP 2020 (s. 55:1-55:16). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2020.55