Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Borowski, M., Fog, B. V., Griggio, C. F., Eagan, J. R.
& Klokmose, C. N. (2023).
Between Principle and Pragmatism: Reflections on Prototyping Computational Media with Webstrates.
ACM Transactions on Computer-Human Interaction,
30(4), Artikel 61.
https://doi.org/10.1145/3569895
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Hansen, K. M. (1999).
BetaDBC. Softwareprogram
Jafargholi, Z., Kamath, C., Klein, K., Komargodski, I., Pietrzak, K. & Wichs, D. (2017).
Be Adaptive, Avoid Overcommitting. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 133-163). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_5
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (s. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11
Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L. (2021).
Balancing Privacy and Accountability in Blockchain Identity Management. I K. G. Paterson (red.),
Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings (s. 552-576). Springer.
https://doi.org/10.1007/978-3-030-75539-3_23