Dawson, J. E.
, Clouston, R., Goré, R. & Tiu, A. (2014).
From display calculi to deep nested sequent calculi: Formalised for full intuitionistic linear logic. I J. Diaz, I. L. Lanese & D. Sangiorgi (red.),
Theoretical Computer Science: 8th IFIP TC 1/WG 2.2 International Conference, TCS 2014, Rome, Italy, September 1-3, 2014. Proceedings (Bind 8705 , s. 250-264). Springer VS.
https://doi.org/10.1007/978-3-662-44602-7_20
Davis, H., Douglas, J. Y.
& Grønbæk, K. (2001).
From the program chairs. iii. Afhandling præsenteret på Hypertext 2001: Proceedings of the Twelfth ACM Conference on Hypertext and Hypermedia, Arhus, Danmark.
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014).
Universally composable oblivious transfer based on a variant of lPN. I D. Gritzalis, A. Kiayias & I. Askoxylakis (red.),
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (s. 143-158). Springer.
https://doi.org/10.1007/978-3-319-12280-9_10
David, B. M., Nishimaki, R.
, Ranellucci, S. & Tapp, A. (2015).
Generalizing Efficient Multiparty Computation. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 15-32 ). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_2
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015).
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. I M.-H. Au & A. Miyaji (red.),
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Bind 9451, s. 354-367). Springer VS.
https://doi.org/10.1007/978-3-319-26059-4_20
Da Rocha Pinto, P.
, Dinsdale-Young, T., Gardner, P. & Sutherland, J. (2016).
Modular termination verification for non-blocking concurrency. I P. Thiemann (red.),
Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings (Bind 9632, s. 176-201). Springer.
https://doi.org/10.1007/978-3-662-49498-1_8
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Local Outlier Detection with Interpretation. I H. Blockeel, K. Kersting , S. Nijssen & F. Železný (red.),
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (s. 304-320 ). Springer VS.
https://doi.org/10.1007/978-3-642-40994-3_20
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. I C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (red.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (s. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Dan, C.
, Hansen, K. A., Jiang, H., Wang, L. & Zhou, Y. (2018).
Low rank approximation of binary matrices: Column subset selection and generalizations. I I. Potapov, J. Worrell & P. Spirakis (red.),
43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Bind 117, s. 41:1-41:16). Artikel 41 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2018.41
Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14