Cahill, V., Gray, E., Seigneur, J.
, Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G. D. M., Bryce, C.
, Carbone, M., Krukow, K. & Nielsen, M. (2003).
Using trust for Secure Collaboration in Uncertain Environments.
I E E E Pervasive Computing,
2(3), 52-61.
https://doi.org/10.1109/MPRV.2003.1228527
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.),
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer.
https://doi.org/10.1007/978-3-030-38471-5_12
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012).
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. I A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (red.),
Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (s. 107-118). Springer.
https://doi.org/10.1007/978-3-642-33392-7_12
Radaelli, L., Moses, Y.
& Jensen, C. S. (2014).
Using cameras to improve Wi-Fi based indoor positioning. I D. Pfoser & K.-J. Li (red.),
Web and Wireless Geographical Information Systems: 13th International Symposium, W2GIS 2014, Seoul, South Korea, May 29-30, 2014. Proceedings (s. 166-183). Springer VS.
https://doi.org/10.1007/978-3-642-55334-9-11
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ITC.2020.5