Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Crazzolara, F.
, Winskel, G., Agrawal, M. (red.) & Seth, A. (red.) (2002).
Composing Strand Spaces. I
Ikke angivet (2556 of Lecture Notes in Computer Science udg., Bind 2556/2002, s. 97-108). Springer.
Elgaard, J.
, Møller, A. & Schwartzbach, M. I. (2000).
Compile-Time Debugging of C Programs Working on Trees. I G. Smolka (red.),
Programming Languages and Systems: 9th European Symposium on Programming, ESOP 2000 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2000 Berlin, Germany, March 25 – April 2, 2000 Proceedings (s. 119-134). Springer.
https://doi.org/10.1007/3-540-46425-5_8
Jagota, A., Lyngsø, R. B.
, Pedersen, C. N. S., Gascuel, O. (red.) & Moret, B. M. E. (red.) (2001).
Comparing Hidden Markov Model and a Stochastic Context-Free Grammer. I
Proceedings of the First International Workshop on Algorithms in Bioinformatics (2149 of Lecture Notes in Computer Science udg., Bind Volume 2149/2001, s. 69-94). Springer.
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12