Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. In J. Katz & M. Robshaw (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Vol. 9816, pp. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17
Alamdari, S., Angelini, P., Barrera-Cruz, F., Chan, T. M., Da Lozzo, G., Di Battista, G., Frati, F., Haxell, P., Lubiw, A., Patrignani, M., Roselli, V., Singla, S.
& Wilkinson, B. T. (2017).
How to Morph Planar Graph Drawings.
S I A M Journal on Computing,
46(2), 824-852.
https://doi.org/10.1137/16M1069171
Fleischhacker, N.
, Larsen, K. G. & Simkin, M. (2023).
How to Compress Encrypted Data. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 551-577). Springer.
https://doi.org/10.1007/978-3-031-30545-0_19
Kohlweiss, M.
, Pancholi, M. R. & Takahashi, A. (2023).
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: Book Subtitle 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III (pp. 486–512). Springer.
https://doi.org/10.1007/978-3-031-48621-0_17
Bardram, J. E., Larsen, S. B., Mamykina, L. (Ed.)
, Bardram, J. E. (Ed.), Korhonen, I. (Ed.), Mynatt, E. D. (Ed.) & Pratt, W. (Ed.) (2004).
Hopper's Home and Hopper's Hospital: Usability Laboratories for Home Care. In
The CHI2004 workshop on HCI and Homecare: Connecting Families and Clinicians
Nygaard, M.
, Winskel, G., Brim, L. (Ed.), Jancar, P. (Ed.), Kretínsky, M. (Ed.) & Kucera, A. (Ed.) (2002).
HOPLA: A Higher-Order Process Language. In
Lecture Notes in Computer Science: Proceedings of the 13th International Conference on Concurrency Theory (Vol. 2421, pp. 434-448). Springer.
Damgård, I. B., Goldreich, O., Okamoto, T. & Wigderson, A. (1995).
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. In D. Coppersmith (Ed.),
Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (pp. 325-338). Springer.
https://doi.org/10.1007/3-540-44750-4_26
Zizzo, A. R., Hvidman, L., Salvig, J. D., Holst, L.
, Kyng, M. & Petersen, O. B. (2022).
Home management by remote self-monitoring in intermediate- and high-risk pregnancies: A retrospective study of 400 consecutive women.
Acta Obstetricia et Gynecologica Scandinavica,
101(1), 135-144.
https://doi.org/10.1111/aogs.14294
Lynggaard, A. B.
, Petersen, M. G., Gude, R. & Mortensen, M. B. (2010).
Home awareness - connecting people sensuously to places. In O. W. Bertelsen, P. Krogh, K. Halskov & M. G. Petersen (Eds.),
Proceedings of the 8th ACM Conference on Designing Interactive Systems, DIS '10 (pp. 416-418). Association for Computing Machinery.
https://doi.org/10.1145/1858171.1858251
Hansen, T. D., Kaplan, H., Tarjan, R. E. & Zwick, U. (2015).
Hollow Heaps. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 689-700). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_56