Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J. & Corredig, M. (2024).
Small and large deformation rheology on pizza cheese as an example of application to study anisotropic properties of food soft materials.
Food Hydrocolloids,
148(Part A), Artikel 109456.
https://doi.org/10.1016/j.foodhyd.2023.109456
Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J., Sode, L., Madsen, J.
& Corredig, M. (2024).
Characterization of high protein anisotropic structures using Rheological fingerprint by large-deformation Lissajous curves.
Science Talks,
9, Artikel 100283.
https://doi.org/10.1016/j.sctalk.2023.100283
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Cujia, K., Wirz, M.
, Kjærgaard, M. B., Roggen, D. & Tröster, G. (2012).
DactyLoc : A minimally geo-referenced WiFi+GSM-fingerprint-based localization method for positioning in urban spaces. I C. Rizos, A. Dempster, B. Li & T. Gallagher (red.),
Proceedings of the 3rd International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2012 (s. 1-9). IEEE.
https://doi.org/10.1109/IPIN.2012.6418923
Cryan, M.
& Miltersen, P. B. (2001).
On pseudorandom generators in NC0. I J. Sgall, A. Pultr & P. Kolman (red.),
Mathematical Foundations of Computer Science 2001: Lecture Notes in Computer Science (Lecture Notes in Computer Science 2136 udg., Bind 2136/2001, s. 272-284). Springer.
Crazzolara, F.
, Winskel, G., Agrawal, M. (red.) & Seth, A. (red.) (2002).
Composing Strand Spaces. I
Ikke angivet (2556 of Lecture Notes in Computer Science udg., Bind 2556/2002, s. 97-108). Springer.
Crazzolara, F.
, Winskel, G., Charpentier, M. (red.) & Sanders, B. (red.) (2001).
Petri Nets in Cryptographic Protocols. I
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01) (Bind 15th International Parallel and Distributed Processing Symposium (IPDPS'01) Workshops, s. 149). IEEE Press.
Cramer, R.
, Damgård, I. B. & Fehr, S. (2001).
On the Cost of Reconstructing a Secret or VSS with Optimal Reconstruction. I J. Killian (red.),
Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001 Proceedings (s. 503-524). Springer.
https://doi.org/10.1007/3-540-44647-8_30
Cramer, R.
, Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999).
Efficient Multiparty Computations Secure Against an Adaptive Adversary. I J. Stern (red.),
Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (s. 311-326). Springer.
https://doi.org/10.1007/3-540-48910-X_22
Cramer, R.
, Damgård, I. B. & MacKenzie, P. (2000).
Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions. I H. Imai & Y. Zheng (red.),
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings (s. 354-373). Springer.
https://doi.org/10.1007/978-3-540-46588-1_24
Cramer, R.
, Damgård, I. B., Kiltz, E.
, Zakarias, S. N. H. & Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. I J. Shikata (red.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Bind 10681, s. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology - CRYPTO 2018 (Bind 10992, s. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Cozza, V., Messina, A., Montesi, D., Arietta, L.
& Magnani, M. (2013).
Spatio-temporal keyword queries in social networks. I B. Catania, G. Guerrini & J. Pokorný (red.),
Advances in Databases and Information Systems: 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings (s. 70-83). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-40683-6_6
Couetoux, B., Gourves, L., Monnot, J.
& Telelis, O. A. (2008).
On Labeled Traveling Salesman Problems: 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings.
Lecture Notes in Computer Science, 776-787.
https://doi.org/10.1007/978-3-540-92182-0_68
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Bind 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Bind 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Bind 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7