Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. I M. Brenner , N. Christin , B. Johnson & K. Rohloff (red.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Bind 8976, s. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404
Du, X., Ooi, B. C., Özsu, M. T., Cui, B., Chen, L.
, Jensen, C. S. & Shahabi, C. (2017).
Preface.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
10367 LNCS, V-VI.
https://doi.org/10.1007/978-3-319-63564-4
Saleem, M. A., Soares da Costa, F., Dolog, P.
, Karras, P., Pedersen, T. B. & Calders, T. (2018).
Predicting Visitors Using Location-Based Social Networks. I
Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (s. 245-250). IEEE.
https://doi.org/10.1109/MDM.2018.00043
Tsourakakis, C. E., Mitzenmacher, M.
, Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018).
Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org.
http://arxiv.org/abs/1709.07308
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. I J. Crampton , S. Jajodia & K. Mayes (red.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (s. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Chase, M., Derler, D., Goldfeder, S.
, Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. (2017).
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. I
CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (s. 1825-1842). Association for Computing Machinery.
https://doi.org/10.1145/3133956.3133997
Kjærgaard, M. B. & Weckemann, K. (2012).
PosQ : Unsupervised Fingerprinting and Visualization of GPS Positioning Quality. I M. Gris & G. Yang (red.),
Mobile Computing, Applications, and Services: Second International ICST Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers (s. 176-194 ). Springer.
https://doi.org/10.1007/978-3-642-29336-8_10
Airiau, S., Aziz, H.
, Caragiannis, I., Kruger, J., Lang, J. & Peters, D. (2023).
Portioning using ordinal preferences: Fairness and efficiency.
Artificial Intelligence,
314, Artikel 103809.
https://doi.org/10.1016/j.artint.2022.103809