Remy, C., Bates, O.
, Thomas, V. J. & Broadbent, M. (2018).
"Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. I B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (red.),
ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Bind 52, s. 316-331). easychair.
https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X.
, Jensen, C. S. & Yang, X. (2018).
Targeted influence minimization in social networks. I G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (s. 689-700). Springer.
https://doi.org/10.1007/978-3-319-93040-4_54
Jensen, C. (red.), Lind Olsen, E. (red.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Bates, O.
, Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018).
The future of HCI and sustainability: Championing environmental and social justice. I R. Mandryk & M. Hancock (red.),
CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Bind 2018-April). Artikel SIG01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185365
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. I D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (red.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Bind 11149, s. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Bardam, S. K.
, Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2018).
Vistrates: A Component Model for Ubiquitous Analytics.
IEEE Transactions on Visualization and Computer Graphics,
25(1), 586-596. Artikel 8440803.
https://doi.org/10.1109/TVCG.2018.2865144
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. I S. Fehr (red.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Bind 10175, s. 88-118). Springer VS.
https://doi.org/10.1007/978-3-662-54388-7_4
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Bind 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Bind 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Bind 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C.
, Sitchinava, N. & Tsirogiannis, C. (2017).
An efficient algorithm for the 1D total visibility-index problem. I S. Fekete & V. Ramachandran (red.),
2017 Proceedings of the Ninteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (Bind PRAL17, s. 218-231). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611974768.18
Hoggan, E., Hsieh, Y.-T., Myllymaa, K., Lantz, V., Kildal, J., Eiler, J. & Jacucci, G. (2017).
An Exploration of Mobile Shape-Changing Textures. I
TEI 2017 - Proceedings of the 11th International Conference on Tangible, Embedded, and Embodied Interaction: TEI '17 (s. 275-282). Association for Computing Machinery.
https://doi.org/10.1145/3024969.3024983
Mathisen, A., Krogh Sørensen, S., Stisen, A., Blunck, H. & Grønbæk, K. (2017).
A Study on the Impact of Indoor Positioning Performance on Activity Recognition Applications. I
14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017 (s. 58-67). Association for Computing Machinery.
https://doi.org/10.1145/3144457.3144501
Andreasen, E., Gong, L.
, Møller, A., Pradel, M., Selakovic, M., Sen, K. & Staicu, C.-A. (2017).
A Survey of Dynamic Analysis and Test Generation for JavaScript.
A C M Computing Surveys,
50(5), 66:1-66:36. Artikel 66.
https://doi.org/10.1145/3106739
Jafargholi, Z., Kamath, C., Klein, K., Komargodski, I., Pietrzak, K. & Wichs, D. (2017).
Be Adaptive, Avoid Overcommitting. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 133-163). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_5