David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (s. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (s. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5
Garg, S. & Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Jespersen, SM., Hansen, ES.
, Hoy, K., Christensen, KO.
, Lindblad, BE., Ahrensberg, J. & Bunger, C. (1995).
Two-level spinal stenosis in minipigs - Hemodynamic effects of exercise.
Spine,
20(24), 2765-2773.
https://doi.org/10.1097/00007632-199512150-00020
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012).
Two Dimensional Range Minimum Queries and Fibonacci Lattices.
Lecture Notes in Computer Science,
7501, 217-228 .
https://doi.org/10.1007/978-3-642-33090-2_20
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S.
, Hansen, K. A. & Tan, Z. (2016).
Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. I
Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Bind 10123, s. 236-250). Springer VS.
https://doi.org/10.1007/978-3-662-54110-4_17
Scheder, D. (2013).
Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. I L. Cai, S.-W. Cheng & A.-W. Lam (red.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 251-261). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_24
Timany, A., Gregersen, S. O., Stefanesco, L.
, Gondelman, L., Nieto, A.
& Birkedal, L. (2021).
Trillium: Unifying Refinement and Higher-Order Distributed Separation Logic.
Timany, A., Gregersen, S. O., Stefanesco, L.
, Hinrichsen, J. K., Gondelman, L., Nieto, A.
& Birkedal, L. (2024).
Trillium: Higher-Order Concurrent and Distributed Separation Logic for Intensional Refinement.
Proceedings of the ACM on Programming Languages ,
8, Artikel 9.
https://doi.org/10.1145/3632851
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156