Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.),
Applied Cryptography and Network Security (s. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Higuchi, N., Imamura, Y.
, Mic, V., Shinohara, T., Hirata, K. & Kuboyama, T. (2020).
Pivot selection for narrow sketches by optimization algorithms. I S. Satoh, L. Vadicamo, F. Carrara, A. Zimek, I. Bartolini, M. Aumüller, B. P. Jonsson & R. Pagh (red.),
Similarity Search and Applications - 13th International Conference, SISAP 2020, Proceedings (s. 33-46). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-60936-8_3
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Rossitto, C., Lampinen, A.
, Bødker, S., Light, A., Berns, K. & Hui, J. (2020).
Reconsidering scale and scaling in CSCW research. I
CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (s. 493-501). Association for Computing Machinery.
https://doi.org/10.1145/3406865.3419409
Clemmensen, T. S.
, Christensen, M., Løgstrup, B. B., Kronborg, C. J. S. & Knudsen, U. B. (2020).
Reduced coronary flow velocity reserve in women with previous pre-eclampsia: link to increased cardiovascular disease risk.
Ultrasound in Obstetrics and Gynecology,
55(6), 786-792.
https://doi.org/10.1002/uog.20407
Zardbani, F., Afshani, P. & Karras, P. (2020).
Revisiting the theory and practice of database cracking. I A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (red.),
Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (s. 415-418). openproceedings.org.
https://doi.org/10.5441/002/edbt.2020.46
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Artikel 114.
https://doi.org/10.1145/3408996
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32