Oliveira, L. B.
, Aranha, D. F., Gouvea, C. P. L., Scott, M., Camara, D. F., Lopez, J. & Dahab, R. (2010).
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Computer Communications,
34(3), 485-493.
https://doi.org/10.1016/j.comcom.2010.05.013
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I.
& Toft, T. (2009).
Privacy-Preserving Face Recognition.
Lecture Notes in Computer Science, 235-253.
https://doi.org/10.1007/978-3-642-03168-7_14
Bøgetoft, P., Lund Christensen, D.
, Damgård, I. B., Geisler, M., Jacobsen, T., Krøigaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K.
, Pagter, J. I., Schwartzbach, M. I., Toft, T. & Nielsen, K. (2009).
Secure Multiparty Computation Goes Live.
Lecture Notes in Computer Science,
5628, 325-343.
https://doi.org/10.1007/978-3-642-03549-4_20
Damgård, I. B. (Ed.), Aceto, L., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I. Springer. Lecture Notes in Computer Science Vol. 5125
https://doi.org/10.1007/978-3-540-70575-8
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Vol. 5126
https://doi.org/10.1007/978-3-540-70583-3
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007).
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 360-378). Springer.
https://doi.org/10.1007/978-3-540-74143-5_20
Damgård, I. B., Krøigaard, M. & Geisler, M. J. (2007).
Efficient and Secure Comparison for On-Line Auctions. In J. Pieprzyk, H. Ghodosi & E. Dawson (Eds.),
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings (Vol. 4586, pp. 416-430). Springer.
https://doi.org/10.1007/978-3-540-73458-1_30
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2007).
Secure Identification and QKD in the Bounded-Quantum-Storage Model. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 342-359). Springer.
https://doi.org/10.1007/978-3-540-74143-5_19
Damgård, I. B., Nielsen, J. B., Fitzi, M. & Desmedt, Y. (2007).
Secure Protocols with Asymmetric Trust. In
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings (pp. 357-375). Springer.
https://doi.org/10.1007/978-3-540-76900-2_22