Kjaer, S. K.
, Andersen, E. S., Djursing, H.
, Hansen, T., Jørgensen, J. J., Nilas, L., Ottesen, B. S.
, Petersen, L. K., Thomsen, S. G. & Toftager-Larsen, K. (2007).
Quadrivalent vaccine mod humant papillomvirus til forebyggelse af svaere celleforandringer på livmoderhalsen.
Ugeskrift for Læger,
169(46), 3971-4.
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2007).
Secure Identification and QKD in the Bounded-Quantum-Storage Model. In A. Menezes (Ed.),
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 342-359). Springer.
https://doi.org/10.1007/978-3-540-74143-5_19
Damgård, I. B., Nielsen, J. B., Fitzi, M. & Desmedt, Y. (2007).
Secure Protocols with Asymmetric Trust. In
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings (pp. 357-375). Springer.
https://doi.org/10.1007/978-3-540-76900-2_22
Brodersen, A. T., Buscher, M.
, Christensen, M., Eriksen, M. A., Grønbæk, K., Kramp, G.
, Kristensen, J. F., Krogh, P., Ludvigsen, M.
, Mogensen, P. H., Nielsen, M. B., Shapiro, D.
& Ørbæk, P. (2007).
Spatial Computing and Spatial Practices. In N. Streitz, A. Kameas & I. Mavrommati (Eds.),
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments Springer.
https://doi.org/10.1007/978-3-540-72727-9_4
Nielsen, J. B. (Ed.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Danner, A.
, Mølhave, T., Yi, K., Agarwal, P. K.
, Arge, L. & Mitasova, H. (2007).
TerraStream: From Elevation Data to Watershed Hierarchies. In
Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (pp. 1-8). Association for Computing Machinery.
https://doi.org/10.1145/1341012.1341049
Westergaard, M., Kristensen, L. M., Brodal, G. S. & Arge, L. (2007).
The ComBack Method - Extending Hash Compaction with Backtracking. In
Petri Nets and Other Models of Concurrency – ICATPN 2007: 28th International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency, ICATPN 2007, Siedlce, Poland, June 25-29, 2007. Proceedings (pp. 455-464). Springer.
https://doi.org/10.1007/978-3-540-73094-1_26