Kjaer, S. K.
, Andersen, E. S., Djursing, H.
, Hansen, T., Jørgensen, J. J., Nilas, L., Ottesen, B. S.
, Petersen, L. K., Thomsen, S. G. & Toftager-Larsen, K. (2007).
Quadrivalent vaccine mod humant papillomvirus til forebyggelse af svaere celleforandringer på livmoderhalsen.
Ugeskrift for Læger,
169(46), 3971-4.
Scafuro, A.
, Siniscalchi, L. & Visconti, I. (2021).
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (s. 469-498). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-75248-4_17
Baum, C., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Orsini, E.
, Roy, L. D. & Scholl, P. (2023).
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology: CRYPTO 2023 (s. 581-615). Springer.
https://doi.org/10.1007/978-3-031-38554-4_19
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Strydonck, T. V.
, Georges, A. L., Guéneau, A., Trieu, A., Timany, A., Piessens, F.
, Birkedal, L. & Devriese, D. (2022).
Proving full-system security properties under multiple attacker models on capability machines. I
Proceedings - 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 (s. 80-95). IEEE.
https://doi.org/10.1109/CSF54842.2022.9919645
Agarwal, A.
, Dowsley, R., McKinney, N. D., Wu, D., Lin, C.-T., De Cock, M. & Nascimento, A. C. A. (2019).
Protecting Privacy of Users in Brain-Computer Interface Applications.
IEEE Transactions on Neural Systems and Rehabilitation Engineering,
27(8), 1546-1555.
https://doi.org/10.1109/TNSRE.2019.2926965
Karbyshev, A., Bjørner, N., Itzhaky, S., Rinetzky, N. & Shoham, S. (2017).
Property-directed inference of universal invariants or proving their absence.
Journal of the ACM,
64(1), 7:1-7:33. Artikel 7.
https://doi.org/10.1145/3022187
Büscher, M., Hartswood, M.
, Mogensen, P. H., Procter, R., Shapiro, D., Slack, R. & Voss, A. (2002).
Promises, Premises and Risks: Sharing Responsibilities, Working Up Trust and Sustaining Commitment in Participatory Design Projects. I
Proceedings of PDC 2002
Rasmussen, T. A. & Merritt, T. R. (2017).
Projectables. I S. M.A., R. A., J. P. & L. P. (red.),
CAADRIA 2017 - 22nd International Conference on Computer-Aided Architectural Design Research in Asia: Protocols, Flows and Glitches (s. 757-766). The Association for Computer-Aided Architectural Design Research in Asia (CAADRIA).
Xu, Z.
, Anderson, K., Lawson, R.
, Brooks, D. J. & Pavese, N. (2018).
Progression of sleep disorders spectrum in Parkinson's Disease: A 5 year clinical longitudinal study.
Movement Disorders,
33, S761-S762.