Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Thiel, S.-K., Remy, C., Roque, L., Orji, R.
, Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019).
Towards a Research Agenda for Gameful Creativity. In
DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 393-396). Association for Computing Machinery.
https://doi.org/10.1145/3301019.3320003
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018).
A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms.
Mobile DNA,
9(1), Article 13.
https://doi.org/10.1186/s13100-018-0118-3
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C.
, Sitchinava, N. & Tsirogiannis, C. (2018).
An efficient algorithm for the 1D total visibility-index problem and its parallelization.
ACM Journal of Experimental Algorithmics,
23, Article 2.3.
https://doi.org/10.1145/3209685
Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Badertscher, C., Garay, J., Maurer, U.
, Tschudi, D. & Zikas, V. (2018).
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In J. Buus Nielsen (Ed.),
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Vol. 10821, pp. 34-65). Springer VS.
https://doi.org/10.1007/978-3-319-78375-8_2
Engemann, K., Pedersen, C. B., Arge, L., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Childhood exposure to green space - A novel risk-decreasing mechanism for schizophrenia? Schizophrenia Research,
199, 142-148.
https://doi.org/10.1016/j.schres.2018.03.026
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. In L. Bauer & R. Küsters (Eds.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10804, pp. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Knudsen, S.
, Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B.
, MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018).
Democratizing Open Energy Data for Public Discourse Using Visualization. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. D406:1-D406:4). Association for Computing Machinery.
https://doi.org/10.1145/3170427.3186539
Neerbek, J., Assent, I. & Dolog, P. (2018).
Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. In D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (Eds.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Vol. 10939, pp. 373-385). Springer VS.
https://doi.org/10.1007/978-3-319-93040-4_30