Filos-Ratsikas, A., Stiil Frederiksen, S. K., Goldberg, P. W. & Zhang, J. (2018).
Hardness results for consensus-halving. In I. Potapov, J. Worrell & P. Spirakis (Eds.),
43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Vol. 117). Article 24 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2018.24
Filinski, A.
, Rohde, H. K. & Walukiewicz, I. (Ed.) (2004).
A Denotational Account of Untyped Normalization by Evaluation. In
Foundations of Software Science and Computation Structures: Proceedings of the 7th International Conference, FOSSACS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 (2987 ed., Vol. Lecture Notes in Computer Science, pp. 167-181). Springer.
Fetzer, V., Müller-Quade, J.
& Nilges, T. (2016).
A Formal Treatment of Privacy in Video Data. In I. Askoxylakis, S. Ioannidis, S. Katsikas & C. Meadows (Eds.),
Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings (Vol. 9879, pp. 406-424). Springer VS.
https://doi.org/10.1007/978-3-319-45741-3_21
Feng, G., Mi, X.
, Bøcher, P. K., Mao, L. F.
, Sandel, B. S., Cao, M., Ye, W. H., Hao, Z. Q., Gong, H. D., Zhang, Y. T., Zhao, X. H., Jin, G. Z., Ma, K.
& Svenning, J.-C. (2014).
Relative roles of local disturbance, current climate and palaeoclimate in determining phylogenetic and functional diversity in Chinese forests.
Biogeosciences,
11, 1361-1370.
https://doi.org/10.5194/bg-11-1361-2014
Feng, G., Mao, L.
, Sandel, B. S., Swenson, N. G.
& Svenning, J.-C. (2016).
High plant endemism in China is partially linked to reduced glacial-interglacial climate change.
Journal of Biogeography,
43(1), 145-154.
https://doi.org/10.1111/jbi.12613
Feldthaus, A., Millstein, T.
, Møller, A., Schäfer, M. & Tip, F. (2011).
Refactoring towards the good parts of JavaScript. Poster session presented at SPLASH 2011, Portland, Oregon, United States.
https://doi.org/10.1145/2048147.2048200
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013).
Efficient construction of approximate call graphs for JavaScript IDE services. In D. Notkin, B. H. C. Cheng & K. Pohl (Eds.),
Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (pp. 752-761 ). IEEE Communications Society.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. In F. V. Fomin (Ed.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (pp. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (pp. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Faust, S., Mukherjee, P., Venturi, D. & Wichs, D. (2014).
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. In P. Q. Nguyen & E. Oswald (Eds.),
Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (pp. 111-128 ). Springer.
https://doi.org/10.1007/978-3-642-55220-5_7
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (pp. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1