Dodds, M., Jagannathan, S., Parkinson, M. J.
, Svendsen, K. & Birkedal, L. (2016).
Verifying custom synchronisation constructs using higher-order separation logic.
ACM Transactions on Programming Languages and Systems,
38/2(2), 4:1 - 4:72. Article 4.
https://doi.org/10.1145/2818638
Hansen, S. T., Gomes, C., Palmieri, M., Thule, C., van de Pol, J. & Woodcock, J. (2021).
Verification of Co-simulation Algorithms Subject to Algebraic Loops and Adaptive Steps. In A. L. Lafuente & A. Mavridou (Eds.),
Formal Methods for Industrial Critical Systems (pp. 3-20). Springer.
https://doi.org/10.1007/978-3-030-85248-1_1
Hansen, S. T., Thule, C., Gomes, C., van de Pol, J., Palmieri, M., Inci, E. O.
, Madsen, F., Alfonso, J., Castellanos, J. Á. & Rodriguez, J. M. (2022).
Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps.
International Journal on Software Tools for Technology Transfer,
24(6), 999-1024.
https://doi.org/10.1007/s10009-022-00686-8
Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Attema, T., Cascudo, I., Cramer, R.
, Damgård, I. & Escudero, D. (2022).
Vector Commitments over Rings and Compressed Σ -Protocols. In E. Kiltz & V. Vaikuntanathan (Eds.),
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Vol. Part 1, pp. 173-202). Springer.
https://doi.org/10.1007/978-3-031-22318-1_7
Borowski, M., Murray, L.
, Bagge, R., Kristensen, J. B., Satyanarayan, A.
& Klokmose, C. N. (2022).
Varv: Reprogrammable Interactive Software as a Declarative Data Structure. In
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Article 492 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3502064
Cahill, V., Gray, E., Seigneur, J.
, Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G. D. M., Bryce, C.
, Carbone, M., Krukow, K. & Nielsen, M. (2003).
Using trust for Secure Collaboration in Uncertain Environments.
I E E E Pervasive Computing,
2(3), 52-61.
https://doi.org/10.1109/MPRV.2003.1228527
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012).
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. In A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (Eds.),
Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (pp. 107-118). Springer.
https://doi.org/10.1007/978-3-642-33392-7_12