Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. In L. Bauer & R. Küsters (Eds.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10804, pp. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Crazzolara, F.
, Winskel, G., Agrawal, M. (Ed.) & Seth, A. (Ed.) (2002).
Composing Strand Spaces. In
Ikke angivet (2556 of Lecture Notes in Computer Science ed., Vol. 2556/2002, pp. 97-108). Springer.
Elgaard, J.
, Møller, A. & Schwartzbach, M. I. (2000).
Compile-Time Debugging of C Programs Working on Trees. In G. Smolka (Ed.),
Programming Languages and Systems: 9th European Symposium on Programming, ESOP 2000 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2000 Berlin, Germany, March 25 – April 2, 2000 Proceedings (pp. 119-134). Springer.
https://doi.org/10.1007/3-540-46425-5_8
Jagota, A., Lyngsø, R. B.
, Pedersen, C. N. S., Gascuel, O. (Ed.) & Moret, B. M. E. (Ed.) (2001).
Comparing Hidden Markov Model and a Stochastic Context-Free Grammer. In
Proceedings of the First International Workshop on Algorithms in Bioinformatics (2149 of Lecture Notes in Computer Science ed., Vol. Volume 2149/2001, pp. 69-94). Springer.
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12