Sørensen, T. S., Beerbaum, P.
, Mosegaard, J., Rasmusson, A., Schaeffter, T., Austin, C., Razavi, R. & Greil, G. F. (2008).
Virtual Cardiotomy based on 3D Magnetic Resonance Imaging for Preoperative Planning in Congenital Heart Disease.
Pediatric Radiology,
38, 1314-1322.
https://doi.org/10.1007/s00247-008-1032-5
Ganesh, C.
, Orlandi, C., Tschudi, D. & Zohar, A. (2022).
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. In J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (Eds.),
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (pp. 173-191). Springer.
https://doi.org/10.1007/978-3-030-93944-1_12
Gondelman, L., Hinrichsen, J. K., Pereira, M.
, Timany, A. & Birkedal, L. (2023).
Verifying Reliable Network Components in a Distributed Separation Logic with Dependent Separation Protocols.
Proceedings of the ACM on Programming Languages ,
7(ICFP), 847-877. Article 217.
https://doi.org/10.1145/3607859
Dodds, M., Jagannathan, S., Parkinson, M. J.
, Svendsen, K. & Birkedal, L. (2016).
Verifying custom synchronisation constructs using higher-order separation logic.
ACM Transactions on Programming Languages and Systems,
38/2(2), 4:1 - 4:72. Article 4.
https://doi.org/10.1145/2818638
Hansen, S. T., Gomes, C., Palmieri, M., Thule, C., van de Pol, J. & Woodcock, J. (2021).
Verification of Co-simulation Algorithms Subject to Algebraic Loops and Adaptive Steps. In A. L. Lafuente & A. Mavridou (Eds.),
Formal Methods for Industrial Critical Systems (pp. 3-20). Springer.
https://doi.org/10.1007/978-3-030-85248-1_1
Hansen, S. T., Thule, C., Gomes, C., van de Pol, J., Palmieri, M., Inci, E. O.
, Madsen, F., Alfonso, J., Castellanos, J. Á. & Rodriguez, J. M. (2022).
Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps.
International Journal on Software Tools for Technology Transfer,
24(6), 999-1024.
https://doi.org/10.1007/s10009-022-00686-8
Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Sidenmark, L., Clarke, C., Newn, J.
, Lystbæk, M. N., Pfeuffer, K. & Gellersen, H. (2023).
Vergence Matching: Inferring Attention to Objects in 3D Environments for Gaze-Assisted Selection. In
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Article 257 Association for Computing Machinery.
https://doi.org/10.1145/3544548.3580685
Attema, T., Cascudo, I., Cramer, R.
, Damgård, I. & Escudero, D. (2022).
Vector Commitments over Rings and Compressed Σ -Protocols. In E. Kiltz & V. Vaikuntanathan (Eds.),
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Vol. Part 1, pp. 173-202). Springer.
https://doi.org/10.1007/978-3-031-22318-1_7
Borowski, M., Murray, L.
, Bagge, R., Kristensen, J. B., Satyanarayan, A.
& Klokmose, C. N. (2022).
Varv: Reprogrammable Interactive Software as a Declarative Data Structure. In
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Article 492 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3502064
Cahill, V., Gray, E., Seigneur, J.
, Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G. D. M., Bryce, C.
, Carbone, M., Krukow, K. & Nielsen, M. (2003).
Using trust for Secure Collaboration in Uncertain Environments.
I E E E Pervasive Computing,
2(3), 52-61.
https://doi.org/10.1109/MPRV.2003.1228527
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12