Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. I T. Lange & R. Steinwandt (red.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Bind 10786, s. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. I L. Cai, S.-W. Cheng & T.-W. Lam (red.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A.
& Kannabiran, G. (2019).
Queer(ing) HCI: Moving forward in theory and practice. I
CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Artikel 3311750 Association for Computing Machinery.
https://doi.org/10.1145/3290607.3311750
Krauter, H.
, Sherson, J. F., Jensen, K., Fernholz, T., Neergaard-Nielsen, J. S., Nielsen, B. M., Oblak, D., Windpassinger, P.
, Kjærgaard, N., Hilliard, A. J., Olausson, C.
, Müller, J. H. & Polzik, E. S. (2008).
Quantum interface between light and atomic ensembles. I
Proceedings of the 18th International Conference on Laser Spectroscopy, ICOLS 2007 (s. 113-124). World Scientific Publishing Co. Pte Ltd.
Høyer, P.
, Neerbek, J. & Shi, Y. (2001).
Quantum complexities of ordered searching, sorting, and element distinctness. I
International Colloquium on Automata, Languages, and Programming: 28th International Colloquium, ICALP 2001 (Bind 2076, s. 346-357)
https://doi.org/10.1007/3-540-48224-5_29
Scafuro, A.
, Siniscalchi, L. & Visconti, I. (2021).
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (s. 469-498). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-75248-4_17
Baum, C., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Orsini, E.
, Roy, L. D. & Scholl, P. (2023).
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology: CRYPTO 2023 (s. 581-615). Springer.
https://doi.org/10.1007/978-3-031-38554-4_19
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Grønbæk, J. E., Korsgaard, H., Petersen, M. G., Henriksen Birk, M.
& Krogh, P. G. (2017).
Proxemic Transitions: Designing Shape-Changing Furniture for Informal Meetings. I
CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (s. 7029-7041)
https://doi.org/10.1145/3025453.3025487
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Vermeulen, J., Luyten, K., Coninx, K., Marquardt, N. & Bird, J. (2015).
Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions. I J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (red.),
Human-Computer Interaction -- INTERACT 2015 (s. 264-281). Springer International Publishing Switzerland.
Strydonck, T. V.
, Georges, A. L., Guéneau, A., Trieu, A., Timany, A., Piessens, F.
, Birkedal, L. & Devriese, D. (2022).
Proving full-system security properties under multiple attacker models on capability machines. I
Proceedings - 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 (s. 80-95). IEEE.
https://doi.org/10.1109/CSF54842.2022.9919645
Agarwal, A.
, Dowsley, R., McKinney, N. D., Wu, D., Lin, C.-T., De Cock, M. & Nascimento, A. C. A. (2019).
Protecting Privacy of Users in Brain-Computer Interface Applications.
IEEE Transactions on Neural Systems and Rehabilitation Engineering,
27(8), 1546-1555.
https://doi.org/10.1109/TNSRE.2019.2926965