Jakobsen, K., Stougaard, J., Petersen, M. G., Winge, J.
, Grønbæk, J. E. & Rasmussen, M. K. (2016).
Expressivity in Open-ended Constructive Play: Building and Playing Musical Lego Instruments. I L. Anthony, G. Sim & R. Jones (red.),
Proceedings of IDC 2016 - The 15th International Conference on Interaction Design and Children (s. 46 - 57). Association for Computing Machinery.
https://doi.org/10.1145/2930674.2930683
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016).
Guarded cubical type theory. Abstract fra 22nd International Conference on Types for Proofs and Programs, Novi Sad, Serbien.
http://www.cs.au.dk/~spitters/TYPES16.pdf
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016).
Guarded Cubical Type Theory: Path Equality for Guarded Recursion. I J.-M. Talbot & L. Regnier (red.),
CSL 2016: 25th EACSL Annual Conference on Computer Science Logic (s. 1 - 17)
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016).
Guarded Cubical Type Theory.
https://arxiv.org/pdf/1611.09263v1.pdf
Bizjak, A., Grathwohl, H. B., Clouston, R., Møgelberg, R. E.
& Birkedal, L. (2016).
Guarded dependent type theory with coinductive types. I B. Jacobs & C. Löding (red.),
Foundations of Software Science and Computation Structures: 19th International Conference, FOSSACS 2016 (Bind 9634, s. 20-35). Springer VS.
https://doi.org/10.1007/978-3-662-49630-5_2
Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. I J. Katz & M. Robshaw (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Bind 9816, s. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17
Bender, E., Schaper, N.
, Caspersen, M. E., Margaritis, M. & Hubwieser, P. (2016).
Identifying and formulating teachers' beliefs and motivational orientations for computer science teacher education.
Studies in Higher Education,
41(11), 1958-1973.
https://doi.org/10.1080/03075079.2015.1004233
Da Rocha Pinto, P.
, Dinsdale-Young, T., Gardner, P. & Sutherland, J. (2016).
Modular termination verification for non-blocking concurrency. I P. Thiemann (red.),
Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings (Bind 9632, s. 176-201). Springer.
https://doi.org/10.1007/978-3-662-49498-1_8
Höök, K. H., Jonsson, M., Ståhl, A., Tholander, J., Robertson, T., Marti, P., Svanæs, D.
, Petersen, M. G., Forlizzi, J., Schiphorst, T., Isbister, K., Hummels, C., Klooster, S., Loke, L. & Khut, G. P. (2016).
Move to Be Moved. I
CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 3301-3308). Association for Computing Machinery.
https://doi.org/10.1145/2851581.2856470
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. I D. Pointcheval, A. Nitaj & T. Rachidi (red.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. I
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Polychroniadou, A., Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016).
On the Complexity of Additively Homomorphic UC Commitments. I E. Kushilevitz & T. Malkin (red.),
Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Bind 9562, s. 542-565). Springer VS.
https://doi.org/10.1007/978-3-662-49096-9