Engemann, K., Svenning, J.-C., Arge, L., Brandt, J., Geels, C., Mortensen, P. B., Plana-Ripoll, O., Tsirogiannis, C. & Pedersen, C. B. (2020).
Natural surroundings in childhood are associated with lower schizophrenia rates.
Schizophrenia Research,
216, 488-495.
https://doi.org/10.1016/j.schres.2019.10.012
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. In P. Müller (Ed.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (pp. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (pp. 587-606). Article 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. In
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Rossitto, C., Lampinen, A.
, Bødker, S., Light, A., Berns, K. & Hui, J. (2020).
Reconsidering scale and scaling in CSCW research. In
CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (pp. 493-501). Association for Computing Machinery.
https://doi.org/10.1145/3406865.3419409
Zardbani, F., Afshani, P. & Karras, P. (2020).
Revisiting the theory and practice of database cracking. In A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (Eds.),
Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (pp. 415-418). openproceedings.org.
https://doi.org/10.5441/002/edbt.2020.46
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Article 114.
https://doi.org/10.1145/3408996
Arge, L., Rav, M., Revsbæk, M.
, Shin, Y. & Yang, J. (2020).
Sea-rise flooding on massive dynamic terrains. In S. Albers (Ed.),
17th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2020 (pp. 6:1-6:19). Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SWAT.2020.6
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Nielsen, J. B. & Spitters, B. (2020).
Smart contract interactions in coq. In E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (Eds.),
Formal Methods- FM 2019 International Workshops - Revised Selected Papers (pp. 380-391). Springer.
https://doi.org/10.1007/978-3-030-54994-7_29
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Teli, M., Foth, M., Sciannamblo, M., Anastasiu, I.
& Lyle, P. J. (2020).
Tales of Institutioning and Commoning: Participatory Design Processes with a Strategic and Tactical Perspective. In C. Del Gaudio, L. Parra-Agudelo, R. Clarke, J. Saad-Sulonen, A. Botero, A. Botero, F. C. Londono, F. C. Londono & P. A. Escandon Suarez (Eds.),
Proceedings of the 16th Participatory Design Conference 2020 (PDC2020 ed., Vol. 1, pp. 159-171). Association for Computing Machinery.
https://doi.org/10.1145/3385010.3385020
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. In M. H. ter Beek & D. Nickovic (Eds.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (pp. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1