Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. I Y. Kalai & L. Reyzin (red.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Bind 10678, s. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Cascudo, I.
, Damgård, I., David, B., Döttling, N., Dowsley, R. & Giacomelli, I. (2019).
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). I S. D. Galbraith & S. Moriai (red.),
Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 606-635). Springer.
https://doi.org/10.1007/978-3-030-34621-8_22
Caragiannis, I., Filos-Ratsikas, A.
, Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016).
Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. I
Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Bind 10123, s. 236-250). Springer VS.
https://doi.org/10.1007/978-3-662-54110-4_17
Caragiannis, I., Gravin, N., Lu, P. & Wang, Z. (2022).
Relaxing the Independence Assumption in Sequential Posted Pricing, Prophet Inequality, and Random Bipartite Matching. I M. Feldman, H. Fu & I. Talgam-Cohen (red.),
Web and Internet Economics : 17th International Conference, WINE 2021 (s. 131-148). Springer.
https://doi.org/10.1007/978-3-030-94676-0_8
Cao, X., Cong, G., Cui, B.
, Jensen, C. S. & Yuan, Q. (2012).
Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives.
A C M Transactions on Information Systems,
30(2), Article No. 7 .
https://doi.org/10.1145/2180868.2180869
Cao, X., Chen, L., Cong, G.
, Jensen, C. S., Qu, Q., Skovsgaard, A., Wu, D. & Yiu, M. L. (2012).
Spatial Keyword Querying: Invited Paper.
Lecture Notes in Computer Science,
7532, 16-29 .
https://doi.org/10.1007/978-3-642-34002-4_2
Cao, X., Cong, G.
, Jensen, C. S., NG, J. J., Ooi, B. C., Phan, N.-T. & Wu, D. (2012).
SWORS: a system for the efficient retrieval of relevant spatial web objects.
Proceedings of the VLDB Endowment,
5(12), 1914-1917.
http://dl.acm.org/citation.cfm?id=2367536
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenková, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study.
Data Mining and Knowledge Discovery,
30(4), 891-927.
https://doi.org/10.1007/s10618-015-0444-8
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenkova, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. I R. Krestel, D. Mottin & E. Müller (red.),
Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Bind 1670, s. 1). ceur workshop proceedings.
http://ceur-ws.org/Vol-1670/paper-55.pdf
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 3-35). Springer.
https://doi.org/10.1007/978-3-030-64834-3_1
Campanelli, M. & Khoshakhlagh, H. (2021).
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? I A. Adhikari, R. Küsters & B. Preneel (red.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (s. 607-631). Springer.
https://doi.org/10.1007/978-3-030-92518-5_27
Campanelli, M., Faonio, A., Fiore, D., Querol, A. & Rodríguez, H. (2021).
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions. I M. Tibouchi & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part III (s. 3-33). Springer.
https://doi.org/10.1007/978-3-030-92078-4_1
Campanelli, M., Francati, D. & Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (s. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Caltais, G., Hojjat, H., Mousavi, M. R.
& Tunç, H. C. (2022).
DyNetKAT: An Algebra of Dynamic Networks. I P. Bouyer & L. Schröder (red.),
Foundations of Software Science and Computation Structures - 25th International Conference, FOSSACS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings (s. 184-204). Springer.
https://doi.org/10.1007/978-3-030-99253-8_10
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S.
, Orlandi, C., Orsini, E.
, Scholl, P. & Smart, N. P. (2021).
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
Journal of Cryptology,
34(3), Artikel 34.
https://doi.org/10.1007/s00145-021-09403-1
Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S. (2023).
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. I W. Meng, C. D. Jensen, C. Cremers & E. Kirda (red.),
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (s. 2501-2515). Association for Computing Machinery.
https://doi.org/10.1145/3576915.3623163