Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Afshani, P., Agrawal, M., Doerr, B., Doerr, C., Larsen, K. G. & Mehlhorn, K. (2019). The query complexity of a permutation-based variant of Mastermind. Discrete Applied Mathematics, 260, 28-50. https://doi.org/10.1016/j.dam.2019.01.007
Aranha, D. F. & Pagnin, E. (2019). The simplest multi-key linearly homomorphic signature scheme. I P. Schwabe & N. Thériault (red.), Progress in Cryptology – LATINCRYPT 2019 (s. 280-300). Springer. https://doi.org/10.1007/978-3-030-30530-7_14
Christensen, P. K., Skovgaard, C. Ø. & Petersen, M. G. (2019). Together together: Combining shared and separate activities in designing technology for family life. I Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019 (s. 374-385). Association for Computing Machinery. https://doi.org/10.1145/3311927.3323141
Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C. & Sabelfeld, A. (2019). TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. Proceedings on Privacy Enhancing Technologies, 2019(4), 93-111. https://doi.org/10.2478/popets-2019-0060
Thiel, S.-K., Remy, C., Roque, L., Orji, R., Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019). Towards a Research Agenda for Gameful Creativity. I DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 393-396). Association for Computing Machinery. https://doi.org/10.1145/3301019.3320003
Li, Y., Tan, T. & Xue, J. (2019). Understanding and analyzing Java reflection. ACM Transactions on Software Engineering and Methodology, 28(2), Artikel 7. https://doi.org/10.1145/3295739
Van Oosterhout, A. (2019). Understanding the benefits and drawbacks of shape change in contrast or addition to other modalities. I DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 113-116). Association for Computing Machinery. https://doi.org/10.1145/3301019.3324875
Bardam, S. K., Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2019). Vistrates: A Component Model for Ubiquitous Analytics. IEEE Transactions on Visualization and Computer Graphics, 25(1), 586-596. Artikel 8440803. https://doi.org/10.1109/TVCG.2018.2865144
Horak, T., Mathisen, A., Klokmose, C. N., Dachselt, R. & Elmqvist, N. (2019). Vistribute: Distributing Interactive Visualizations in Dynamic Multi-Device Setups. I CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems Artikel 616 Association for Computing Machinery. https://doi.org/10.1145/3290605.3300846
David, B., Dowsley, R. & Larangeira, M. (2018). 21 - Bringing down the complexity: Fast composable protocols for card games without secret state. I W. Susilo & G. Yang (red.), Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings (s. 45-63). Springer. https://doi.org/10.1007/978-3-319-93638-3_4
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018). A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms. Mobile DNA, 9(1), Artikel 13. https://doi.org/10.1186/s13100-018-0118-3
Bertelsen, O. W. (2018). Against Boredom: The Demonic Pantheism in Design. I J. Bardzell, S. Berdzell & M. Blythe (red.), Critical Theory and Interaction Design (s. 81-94). MIT Press.
Timany, A., Stefanesco, L., Krogh-Jespersen, M. & Birkedal, L. (2018). A Logical Relation for Monadic Encapsulation of State: Proving contextual equivalences in the presence of runST. I Proceedings of the ACM on Programming Languages (Bind 2, s. 64:00-64:28). Association for Computing Machinery. https://doi.org/10.1145/3158152
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2018). An efficient algorithm for the 1D total visibility-index problem and its parallelization. ACM Journal of Experimental Algorithmics, 23, Artikel 2.3. https://doi.org/10.1145/3209685
Jensen, M. M. & Aagaard, J. (2018). A Postphenomenological Method for HCI Research. I Proceedings of the 30th Australian Computer-Human Interaction Conference, OzCHI 2018: OzCHI 2018 (s. 242-251). Association for Computing Machinery. https://doi.org/10.1145/3292147.3292170
Angelini, M., Santucci, G., Schumann, H. & Schulz, H.-J. (2018). A Review and Characterization of Progressive Visual Analytics. Informatics, 5(3), Artikel 31. https://doi.org/10.3390/informatics5030031
Badertscher, C., Garay, J., Maurer, U., Tschudi, D. & Zikas, V. (2018). But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. I J. Buus Nielsen (red.), Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Bind 10821, s. 34-65). Springer VS. https://doi.org/10.1007/978-3-319-78375-8_2
Dalskov, A. P. K. & Orlandi, C. (2018). Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. I J. Kim, G.-J. Ahn & S. Kim (red.), ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (s. 343-355). Association for Computing Machinery. https://doi.org/10.1145/3196494.3196547
Mathisen, A. & Grønbæk, K. (2018). Clear Visual Separation of Temporal Event Sequences. I 2017 IEEE Visualization in Data Science, VDS 2017 (s. 7-14). Artikel 8573439 IEEE. https://doi.org/10.1109/VDS.2017.8573439
Ciampi, M. & Orlandi, C. (2018). Combining Private Set-Intersection with Secure Two-Party Computation. I D. Catalano & R. De Prisco (red.), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Bind 11035, s. 464-482). Springer VS. https://doi.org/10.1007/978-3-319-98113-0
Dowsley, R., Lacerda, F. & Nascimento, A. C. A. (2018). Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IEEE Transactions on Information Theory, 64(8), 5970-5984. https://doi.org/10.1109/TIT.2018.2796128
Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M. (2018). Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS. https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018). Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.), Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS. https://doi.org/10.1007/978-3-319-89722-6_3
Hansen, K. A. & Lund, T. B. (2018). Computational Complexity of Proper Equilibrium. I É. Tardos, E. Elkind & R. Vohra (red.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (s. 113-130). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219199
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018). Computer-Aided Proofs for Multiparty Computation with Active Security. I Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE. https://doi.org/10.1109/CSF.2018.00016
Arge, L., Shin, Y. & Tsirogiannis, C. (2018). Computing Floods Caused by Non-Uniform Sea-Level Rise. I R. Pagh & S. Venkatasubramanian (red.), 2018 Proceedings of the 20th Workshop on Algorithm Engineering and Experiments, ALENEX 2018 (s. 97-108). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975055.9
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.), Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS. https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A., Nielsen, J. B., Simkin, M. & Venturi, D. (2018). Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.), Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS. https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018). Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_9
Larsen, K. G., Weinstein, O. & Yu, H. (2018). Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds. I M. Henzinger, D. Kempe & I. Diakonikolas (red.), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (s. 978-989). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188790
Christensen, H. B. (2018). Crunch: Automated Assessment of Microservice Architecture Assignments with Formative Feedback. I C. E. Cuesta, J. Perez & D. Garlan (red.), Software Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings: 12th European Conference on Software Architecture, ECSA 2018 (Bind 11048, s. 175-190). Springer. https://doi.org/10.1007/978-3-030-00761-4_12