Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C.
, Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Higuchi, N., Imamura, Y.
, Mic, V., Shinohara, T., Hirata, K. & Kuboyama, T. (2020).
Pivot selection for narrow sketches by optimization algorithms. I S. Satoh, L. Vadicamo, F. Carrara, A. Zimek, I. Bartolini, M. Aumüller, B. P. Jonsson & R. Pagh (red.),
Similarity Search and Applications - 13th International Conference, SISAP 2020, Proceedings (s. 33-46). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-60936-8_3
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J.
& Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Rossitto, C., Lampinen, A.
, Bødker, S., Light, A., Berns, K. & Hui, J. (2020).
Reconsidering scale and scaling in CSCW research. I
CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (s. 493-501). Association for Computing Machinery.
https://doi.org/10.1145/3406865.3419409
Zardbani, F., Afshani, P. & Karras, P. (2020).
Revisiting the theory and practice of database cracking. I A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (red.),
Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (s. 415-418). openproceedings.org.
https://doi.org/10.5441/002/edbt.2020.46
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Artikel 114.
https://doi.org/10.1145/3408996
Dalskov, A. P. K.
, Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Nielsen, J. B.
& Spitters, B. (2020).
Smart contract interactions in coq. I E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (red.),
Formal Methods- FM 2019 International Workshops - Revised Selected Papers (s. 380-391). Springer.
https://doi.org/10.1007/978-3-030-54994-7_29
Damgård, I., Haagh, H., Mercer, R., Nitulescu, A.
, Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. I R. Pass & K. Pietrzak (red.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Bind II, s. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Teli, M., Foth, M., Sciannamblo, M., Anastasiu, I. & Lyle, P. J. (2020).
Tales of Institutioning and Commoning: Participatory Design Processes with a Strategic and Tactical Perspective. I C. Del Gaudio, L. Parra-Agudelo, R. Clarke, J. Saad-Sulonen, A. Botero, A. Botero, F. C. Londono, F. C. Londono & P. A. Escandon Suarez (red.),
Proceedings of the 16th Participatory Design Conference 2020 (PDC2020 udg., Bind 1, s. 159-171). Association for Computing Machinery.
https://doi.org/10.1145/3385010.3385020
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Tsitsulin, A., Munkhoeva, M.
, Mottin, D., Karras, P., Bronstein, A., Oseledets, I. & Müller, E. (2020).
The Shape of Data: Intrinsic Distance for Data Distributions. Afhandling præsenteret på The International Conference on Learning Representations (ICLR), Ababa, Etiopien.
Eerikson, H., Keller, M.
, Orlandi, C., Pullonen, P., Puura, J. & Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5