Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Dalskov, A. P. K., Lee, E.
& Soria Vazquez, E. (2020).
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings (Bind III). Springer.
Dalsgaard, B., Magård, E., Fjeldså, J., Martín González, A. M., Rahbek, C.
, Olesen, J. M., Ollerton, J., Alarcón, R., Cardoso Araujo, A., A. Cotton, P., Lara, C., Graco Machado, C., Sazima, I., Sazima, M.
, Timmermann, A., Watts, S.
, Sandel, B. S., J. Sutherland, W.
& Svenning, J.-C. (2011).
Specialization in Plant-Hummingbird Networks Is Associated with Species Richness, Contemporary Precipitation and Quaternary Climate-Change Velocity.
P L o S One,
6(10).
https://doi.org/10.1371/journal.pone.0025891
Dalsgaard, P., Pedersen, B. P., Dimke, H., Møller, N. M.
, Normand, S., Bjørk, R., Bille, M.
& Larsen, K. G. (2018).
Opholdskrav i skatteaftale hæmmer dansk forskning.
Politiken, (Sektion 2 (Kultur)), 7.
Dahlsen-Jensen, M. B., Fievet, B., Petrucci, L.
& de Pol, J. V. (2024).
On-The-Fly Algorithm for Reachability in Parametric Timed Games. I B. Finkbeiner & L. Kovács (red.),
Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings (s. 194-212). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-57256-2_10
Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J. & Corredig, M. (2024).
Small and large deformation rheology on pizza cheese as an example of application to study anisotropic properties of food soft materials.
Food Hydrocolloids,
148(Part A), Artikel 109456.
https://doi.org/10.1016/j.foodhyd.2023.109456
Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J., Sode, L., Madsen, J.
& Corredig, M. (2024).
Characterization of high protein anisotropic structures using Rheological fingerprint by large-deformation Lissajous curves.
Science Talks,
9, Artikel 100283.
https://doi.org/10.1016/j.sctalk.2023.100283
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Cujia, K., Wirz, M.
, Kjærgaard, M. B., Roggen, D. & Tröster, G. (2012).
DactyLoc : A minimally geo-referenced WiFi+GSM-fingerprint-based localization method for positioning in urban spaces. I C. Rizos, A. Dempster, B. Li & T. Gallagher (red.),
Proceedings of the 3rd International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2012 (s. 1-9). IEEE.
https://doi.org/10.1109/IPIN.2012.6418923
Cramer, R.
, Damgård, I. B., Kiltz, E.
, Zakarias, S. N. H. & Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. I J. Shikata (red.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Bind 10681, s. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology - CRYPTO 2018 (Bind 10992, s. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Cozza, V., Messina, A., Montesi, D., Arietta, L.
& Magnani, M. (2013).
Spatio-temporal keyword queries in social networks. I B. Catania, G. Guerrini & J. Pokorný (red.),
Advances in Databases and Information Systems: 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings (s. 70-83). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-40683-6_6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Bind 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Bind 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Bind 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7
Cohen-Addad, V.
, Larsen, K. G., Saulpic, D.
, Schwiegelshohn, C. & Sheikh-Omar, O. A. (2022).
Improved Coresets for Euclidean k-Means. I S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho & A. Oh (red.),
Advances in Neural Information Processing Systems 35 - 36th Conference on Neural Information Processing Systems, NeurIPS 2022 Neural Information Processing Systems Foundation.
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. (2013).
Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed.
Electronic Colloquium on Computational Complexity, (TR13-107).
http://eccc.hpi-web.de/report/2013/107/
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013).
Efficient multiparty protocols via log-depth threshold formulae. I R. Canetti & J. A. Garay (red.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (s. 185-202). Springer VS.
https://doi.org/10.1007/978-3-642-40084-1_11