Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J. & Corredig, M. (2024).
Small and large deformation rheology on pizza cheese as an example of application to study anisotropic properties of food soft materials.
Food Hydrocolloids,
148(Part A), Article 109456.
https://doi.org/10.1016/j.foodhyd.2023.109456
Dahl, J. F., Gregersen, S. B., Andersen, U.
, Schulz, H.-J., Sode, L., Madsen, J.
& Corredig, M. (2024).
Characterization of high protein anisotropic structures using Rheological fingerprint by large-deformation Lissajous curves.
Science Talks,
9, Article 100283.
https://doi.org/10.1016/j.sctalk.2023.100283
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. In K. Kurosawa & G. Hanaoka (Eds.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Vol. 7778 LNCS, pp. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Cujia, K., Wirz, M.
, Kjærgaard, M. B., Roggen, D. & Tröster, G. (2012).
DactyLoc : A minimally geo-referenced WiFi+GSM-fingerprint-based localization method for positioning in urban spaces. In C. Rizos, A. Dempster, B. Li & T. Gallagher (Eds.),
Proceedings of the 3rd International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2012 (pp. 1-9). IEEE.
https://doi.org/10.1109/IPIN.2012.6418923
Cryan, M.
& Miltersen, P. B. (2001).
On pseudorandom generators in NC0. In J. Sgall, A. Pultr & P. Kolman (Eds.),
Mathematical Foundations of Computer Science 2001: Lecture Notes in Computer Science (Lecture Notes in Computer Science 2136 ed., Vol. 2136/2001, pp. 272-284). Springer.
Crazzolara, F.
, Winskel, G., Agrawal, M. (Ed.) & Seth, A. (Ed.) (2002).
Composing Strand Spaces. In
Ikke angivet (2556 of Lecture Notes in Computer Science ed., Vol. 2556/2002, pp. 97-108). Springer.
Crazzolara, F.
, Winskel, G., Charpentier, M. (Ed.) & Sanders, B. (Ed.) (2001).
Petri Nets in Cryptographic Protocols. In
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01) (Vol. 15th International Parallel and Distributed Processing Symposium (IPDPS'01) Workshops, pp. 149). IEEE Press.
Cramer, R.
, Damgård, I. B. & Fehr, S. (2001).
On the Cost of Reconstructing a Secret or VSS with Optimal Reconstruction. In J. Killian (Ed.),
Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001 Proceedings (pp. 503-524). Springer.
https://doi.org/10.1007/3-540-44647-8_30
Cramer, R.
, Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999).
Efficient Multiparty Computations Secure Against an Adaptive Adversary. In J. Stern (Ed.),
Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (pp. 311-326). Springer.
https://doi.org/10.1007/3-540-48910-X_22
Cramer, R.
, Damgård, I. B. & MacKenzie, P. (2000).
Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions. In H. Imai & Y. Zheng (Eds.),
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings (pp. 354-373). Springer.
https://doi.org/10.1007/978-3-540-46588-1_24
Cramer, R.
, Damgård, I. B., Kiltz, E.
, Zakarias, S. N. H. & Zottarel, A. (2012).
DDH-Like Assumptions Based on Extension Rings.
Lecture Notes in Computer Science,
7293, 644-661 .
https://doi.org/10.1007/978-3-642-30057-8_38
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. In J. Shikata (Ed.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Vol. 10681, pp. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Cozza, V., Messina, A., Montesi, D., Arietta, L.
& Magnani, M. (2013).
Spatio-temporal keyword queries in social networks. In B. Catania, G. Guerrini & J. Pokorný (Eds.),
Advances in Databases and Information Systems: 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings (pp. 70-83). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-40683-6_6
Couetoux, B., Gourves, L., Monnot, J.
& Telelis, O. A. (2008).
On Labeled Traveling Salesman Problems: 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings.
Lecture Notes in Computer Science, 776-787.
https://doi.org/10.1007/978-3-540-92182-0_68
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (Eds.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J.-S. Coron & J. Buus Nielsen (Eds.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7