Fitzi, M., Garay, J. A., Gollakota, S., Rangan, C. P. & Srinathan, K. (2006).
Round-optimal and Efficient Verifiable Secret Sharing. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006 Proceedings (pp. 329-342). Springer.
https://doi.org/10.1007/11681878_17
Weinberg, M. S., Villeneuve, L. M., Ehsani, A., Amarzguioui, M.
, Aagaard, L., Chen, Z.-X., Riggs, A. D., Rossi, J. J. & Morris, K. V. (2006).
The antisense strand of small interfering RNAs directs histone methylation and transcriptional gene silencing in human cells.
RNA,
12(2), 256–262.
https://doi.org/10.1261/rna.2235106
Bataillon, T., Mailund, T., Thorlacius, S., Steingrimsson, E., Rafnar, T., Halldorsson, M., Calian, V.
& Schierup, M. H. (2006).
The effective size of the Icelandic population and the prospects for LD mapping: inference from unphased microsatellite markers.
European Journal of Human Genetics,
14, 1044–1053.
https://doi.org/10.1038/sj.ejhg.5201669
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15
Beldiceanu, N.
, Katriel, I. & Lorca, X. (2006).
Undirected Forest Constraints. In
Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2006) (Vol. LNCS 3990, pp. 29-43). Springer.