Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Jafargholi, Z., Kamath, C., Klein, K., Komargodski, I., Pietrzak, K. & Wichs, D. (2017).
Be Adaptive, Avoid Overcommitting. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 133-163). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_5
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (s. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. I K. G. Paterson (red.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (s. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23
Oortwijn, W., Huisman, M., Joosten, S. J. C.
& van de Pol, J. (2020).
Automated verification of parallel nested DFS. I A. Biere & D. Parker (red.),
Tools and Algorithms for the Construction and Analysis of Systems- 26th International Conference, TACAS 2020, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings, Part I (s. 247-265). Springer.
https://doi.org/10.1007/978-3-030-45190-5_14
Evangelista Belo, J. M., Lystbæk, M. N., Feit, A. M.
, Pfeuffer, K., Kán, P., Oulasvirta, A.
& Grønbæk, K. (2022).
AUIT – the Adaptive User Interfaces Toolkit for Designing XR Applications. I
UIST '22: Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology Artikel 48 Association for Computing Machinery.
https://doi.org/10.1145/3526113.3545651
Larsen, C. A., Schmidt, S. M., Steensgaard, J., Jakobsen, A. B., Pol, J. V. D. & Pavlogiannis, A. (2023).
A Truly Symbolic Linear-Time Algorithm for SCC Decomposition.
Lecture Notes in Computer Science,
13994, 353-371.
https://doi.org/10.1007/978-3-031-30820-822
Chatzopoulos, S., Vergoulis, T., Skoutas, D., Dalamagas, T., Tryfonopoulos, C.
& Karras, P. (2023).
Atrapos: Real-time Evaluation of Metapath Query Workloads. I
ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023 (s. 2487-2498). Association for Computing Machinery.
https://doi.org/10.1145/3543507.3583322
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Bind III, s. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Andreasen, E., Gong, L.
, Møller, A., Pradel, M., Selakovic, M., Sen, K. & Staicu, C-A. (2017).
A Survey of Dynamic Analysis and Test Generation for JavaScript.
A C M Computing Surveys,
50(5), 66:1-66:36. Artikel 66.
https://doi.org/10.1145/3106739
Mathisen, A., Krogh Sørensen, S., Stisen, A., Blunck, H. & Grønbæk, K. (2017).
A Study on the Impact of Indoor Positioning Performance on Activity Recognition Applications. I
14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017 (s. 58-67). Association for Computing Machinery.
https://doi.org/10.1145/3144457.3144501
Al Farid, F., Hashim, N., Abdullah, J., Bhuiyan, M. R., Shahida Mohd Isa, W. N., Uddin, J.
, Haque, M. A. & Husen, M. N. (2022).
A Structured and Methodological Review on Vision-Based Hand Gesture Recognition System.
Journal of Imaging,
8(6), Artikel 153.
https://doi.org/10.3390/jimaging8060153