Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Leiva, G., Grønbæk, J. E., Klokmose, C. N., Nguyen, C., Kazi, R. H. & Asente, P. (2021).
Rapido: Prototyping Interactive AR Experiences through Programming by Demonstration. I
UIST 2021 - Proceedings of the 34th Annual ACM Symposium on User Interface Software and Technology (s. 626-637). Association for Computing Machinery.
https://doi.org/10.1145/3472749.3474774
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. I T. Lange & R. Steinwandt (red.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Bind 10786, s. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. I L. Cai, S.-W. Cheng & T.-W. Lam (red.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Alphonce, C.
, Caspersen, M. E., Decker, A. & Trask, B. (2006).
"Killer examples" for design patterns: the fifth annual OOPSLA "Killer Examples" workshop. I P. L. Tarr & W. R. Cook (red.),
OOPSLA '06: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (s. 625-626). Society for Industrial and Applied Mathematics.
https://doi.org/10.1145/1176617.1176640
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A.
& Kannabiran, G. (2019).
Queer(ing) HCI: Moving forward in theory and practice. I
CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Artikel 3311750 Association for Computing Machinery.
https://doi.org/10.1145/3290607.3311750