Engelmann, F. T., Müller, L., Peter, A., Kargl, F. & Bösch, C. (2021).
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Proceedings on Privacy Enhancing Technologies,
2021(4), 270-290.
https://doi.org/10.2478/popets-2021-0070
Remy, C., Bates, O.
, Thomas, V. J. & Broadbent, M. (2018).
"Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. I B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (red.),
ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Bind 52, s. 316-331). easychair.
https://doi.org/10.29007/kln5
Hansen, K. M., Damm, C. H., Thomsen, M. & Tyrsted, M. (2000).
Supporting several levels of restriction in the UML. I A. Evans, S. Kent & B. Selic (red.),
«UML» 2000 - The Unified Modeling Language: Advancing the Standard. Third International Conference York, UK, October 2-6, 2000 Proceedings (s. 396-409). Springer.
https://doi.org/10.1007/3-540-40011-7_29
Bilstrup, K.-E. K., Kaspersen, M. H., Lunding, M. S., Schaper, M.-M. A., Van Mechelen, M., Tamashiro, M. A., Smith, R. C., Iversen, O. S. & Petersen, M. G. (2022).
Supporting Critical Data Literacy in K-9 Education: Three Principles for Enriching Pupils’ Relationship to Data. I
Proceedings of Interaction Design and Children, IDC 2022 (s. 225-236). Association for Computing Machinery.
https://doi.org/10.1145/3501712.3530783
MacIntyre, B., Mynatt, E. D., Voida, S.
, Hansen, K. M., Tullio, J. & Corso, G. M. (2001).
Support for Multitasking and background Awareness Using Interactive Peripheral Displays. I J. Marks & E. D. Mynatt (red.),
Proceedings of the 14th annual ACM symposium on User interface software and technology (s. 41-50). Association for Computing Machinery.
https://doi.org/10.1145/502348.502355
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. I C. Padró (red.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (s. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Miltersen, P. B., Vinodchandran, N. V. & Watanabe, O. (1999).
Super-Polynomial Versus Half-Exponential Circuit Size in the Exponential Hierarchy. I T. Asano, H. Imai, D. T. Lee, S. Nakano & T. Tokuyama (red.),
Computing and Combinatorics: 5th Annual International Conference, COCOON'99 Tokyo, Japan, July 26-28, 1999 Proceedings (s. 210-220). Springer.
https://doi.org/10.1007/3-540-48686-0_21
Nielsen, J. B. (red.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Campanelli, M. & Khoshakhlagh, H. (2021).
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? I A. Adhikari, R. Küsters & B. Preneel (red.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (s. 607-631). Springer.
https://doi.org/10.1007/978-3-030-92518-5_27
Abboud, A., Backurs, A.
, Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. I
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery.
https://doi.org/10.1137/1.9781611974331.ch88