Ateniese, G., Chen, L.
, Francati, D., Papadopoulos, D. & Tang, Q. (2023).
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). I A. Boldyreva & V. Kolesnikov (red.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (s. 63-93). Springer.
https://doi.org/10.1007/978-3-031-31371-4_3
Sidenmark, L., Clarke, C., Newn, J.
, Lystbæk, M. N., Pfeuffer, K. & Gellersen, H. (2023).
Vergence Matching: Inferring Attention to Objects in 3D Environments for Gaze-Assisted Selection. I
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Artikel 257 Association for Computing Machinery.
https://doi.org/10.1145/3544548.3580685
Attema, T., Cascudo, I., Cramer, R.
, Damgård, I. & Escudero, D. (2022).
Vector Commitments over Rings and Compressed Σ -Protocols. I E. Kiltz & V. Vaikuntanathan (red.),
Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Bind Part 1, s. 173-202). Springer.
https://doi.org/10.1007/978-3-031-22318-1_7
Borowski, M., Murray, L.
, Bagge, R., Kristensen, J. B., Satyanarayan, A.
& Klokmose, C. N. (2022).
Varv: Reprogrammable Interactive Software as a Declarative Data Structure. I
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Artikel 492 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3502064
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012).
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. I A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (red.),
Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (s. 107-118). Springer.
https://doi.org/10.1007/978-3-642-33392-7_12
Radaelli, L., Moses, Y.
& Jensen, C. S. (2014).
Using cameras to improve Wi-Fi based indoor positioning. I D. Pfoser & K.-J. Li (red.),
Web and Wireless Geographical Information Systems: 13th International Symposium, W2GIS 2014, Seoul, South Korea, May 29-30, 2014. Proceedings (s. 166-183). Springer VS.
https://doi.org/10.1007/978-3-642-55334-9-11
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Brynskov, M., Bermúdez, J. C. C., Fernández, M.
, Korsgaard, H., Mulder, I., Piskorek, K., Rekow, L. & de Waal, M. (2014).
Urban Interaction Design: Towards City Making. Urban IxD Booksprint.
http://static1.squarespace.com/static/50f5c859e4b083caad2ed6a0/t/5395d6a5e4b0fc0456d8d5a3/1402328741769/UrbanIxD_towardsCityMaking.pdf
Kjærgaard, M. B. & Blunck, H. (2012).
Unsupervised Power Profiling for Mobile Devices. I A. Puiatti & T. Gu (red.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (s. 138-149). Springer.
https://doi.org/10.1007/978-3-642-30973-1_12
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014).
Universally composable oblivious transfer based on a variant of lPN. I D. Gritzalis, A. Kiayias & I. Askoxylakis (red.),
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (s. 143-158). Springer.
https://doi.org/10.1007/978-3-319-12280-9_10