Bødker, S., Klokmose, C. N., Korn, M. & Polli, A. M. (2014).
Participatory IT in semi-public spaces. I V. Roto, J. Häkkilä, K. Väänänen-Vainio-Mattila & O. Juhlin (red.),
Proceedings of the 8th Nordic Conference on Human-Computer Interaction, NordiCHI '14: Fun, Fast, Foundational (s. 765-774). Association for Computing Machinery.
https://doi.org/10.1145/2639189.2639212
Mogensen, P. H. & Wollsen, S. (2014).
Participatory Realisation? PD in a complex, large-scale, and commercial context. I O. S. Iversen, H. Winschiers-Theophilus, V. D'Andrea, A. Clement, A. Botero & K. Bødker (red.),
Proceedings of the 13th Participatory Design Conference, PDC '14 : Research Papers (s. 21-30 (Vol. 1)). Association for Computing Machinery.
https://doi.org/10.1145/2661435.2661443
Verdezoto, N., Nunes, F.
, Grönvall, E., Fitzpatrick, G., Storni, C.
& Kyng, M. (red.) (2014).
Proceedings of Designing Self-care for Everyday Life. Workshop in conjunction with NordiCHI 2014, 27th October 2014, Helsinki, Finland. Department of Computer Science, Aarhus University. DAIMI PB Nr. 597
http://ojs.statsbiblioteket.dk/index.php/daimipb/issue/view/2772
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Wagner, S., Kamper, C. H., Rasmussen, N. H.
, Ahrendt, P., Toftegaard, T. S. & Bertelsen, O. W. (2014).
Reliable blood pressure self-measurement in the obstetric waiting room.
Methods of Information in Medicine,
53(3), 225-234.
https://doi.org/10.3414/ME13-01-0032
Sanggaard, K. W., Bechsgaard, J. S., Fang, X.
, Duan, J., Dyrlund, T. F., Gupta, V., Jiang, X., Cheng, L., Fan, D., Feng, Y., Han, L., Huang, Z., Wu, Z., Liao, L.
, Settepani, V., Thøgersen, I. B., Vanthournout, B., Wang, T., Zhu, Y.
... Wang, J. (2014).
Spider genomes provide insight into composition and evolution of venom and silk.
Nature Communications,
5, Artikel 3765.
https://doi.org/10.1038/ncomms4765
Orlandi, C., Ostrovsky, R., Rao, V., Sahai, A. & Visconti, I. (2014).
Statistical Concurrent Non-malleable Zero Knowledge. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings (s. 167-191). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-54242-8_8
Madsen, M. & Andreasen, E. (2014).
String Analysis for Dynamic Field Access. I A. Cohen (red.),
Compiler Construction: 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings (s. 197-217). Springer.
https://doi.org/10.1007/978-3-642-54807-9_12
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. I C. Padró (red.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (s. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Etessami, K.
, Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014).
The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. I R. Lavi (red.),
Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (s. 231-243 ). Springer VS.
https://doi.org/10.1007/978-3-662-44803-8_20