Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. I
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Bender, M. A.
, Brodal, G. S., Fagerberg, R., Ge, D., He, S., Hu, H., Iacono, J. & López-Ortiz, A. (2011).
The Cost of Cache-Oblivious Searching.
Algorithmica,
61(2), 463-505.
https://doi.org/10.1007/s00453-010-9394-0
Bender, E., Schaper, N.
, Caspersen, M. E., Margaritis, M. & Hubwieser, P. (2016).
Identifying and formulating teachers' beliefs and motivational orientations for computer science teacher education.
Studies in Higher Education,
41(11), 1958-1973.
https://doi.org/10.1080/03075079.2015.1004233
Benarroch, D.
, Campanelli, M., Fiore, D., Gurkan, K. & Kolonelos, D. (2021).
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. I N. Borisov & C. Diaz (red.),
Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (s. 393-414). Springer.
https://doi.org/10.1007/978-3-662-64322-8_19
Bellatreche, L., Dumas, M.
, Karras, P., Matulevicius, R., Awad, A., Weidlich, M., Ivanovic, M. & Hartig, O. (red.) (2021).
New Trends in Database and Information Systems: ADBIS 2021 Short Papers, Doctoral Consortium and Workshops: DOING, SIMPDA, MADEISD, MegaData, CAoNS, Tartu, Estonia, August 24-26, 2021, Proceedings. Springer. Communications in Computer and Information Science Bind 1450
https://doi.org/10.1007/978-3-030-85082-1
Bellatreche, L., Dumas, M.
, Karras, P. & Matulevicius, R. (red.) (2021).
Advances in Databases and Information Systems: 25th European Conference, ADBIS 2021, Tartu, Estonia, August 24–26, 2021, Proceedings. Springer. Lecture Notes in Computer Science (LNCS) Bind 12843
https://doi.org/10.1007/978-3-030-82472-3
Beer, A., Draganov, A., Hohma, E., Jahn, P., Frey, C. M. M.
& Assent, I. (2023).
Connecting the Dots: Density-Connectivity Distance unifies DBSCAN, k-Center and Spectral Clustering. I
KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (s. 80-92). Association for Computing Machinery.
https://doi.org/10.1145/3580305.3599283
Beaudouin-Lafon, M., Chapuis, O., Eagan, J. R.
, Gjerlufsen, T., Huot, S.
, Klokmose, C. N., Mackay, W., Nancel, M., Pietriga, E., Pillias, C., Primet, R. & Wagner, J. (2012).
Multi-surface Interaction in the WILD Room.
Computer,
45(4), 48-56.
https://doi.org/10.1109/MC.2012.110
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. I J. Katz & M. Robshaw (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Bind 9816, s. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17
Baum, C., Damgård, I., Lyubashevsky, V.
, Oechsner, S. & Peikert, C. (2018).
More Efficient Commitments from Structured Lattice Assumptions. I D. Catalano & R. De Prisco (red.),
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Bind 11035, s. 368-385). Springer VS.
https://doi.org/10.1007/978-3-319-98113-0_20
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. I D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (red.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Bind 11149, s. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E.
, Scholl, P. & Zaverucha, G. (2021).
Banquet: Short and Fast Signatures from AES. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (s. 266-297). Springer.
https://doi.org/10.1007/978-3-030-75245-3_11