Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
de Senneville, B. D.
, Noe, K. Ø., Ries, M.
, Pedersen, M., Moonen, C.
& Sørensen, T. S. (2008).
An optimised multi-baseline approach for on-line MR-temperature monitoring on commodity graphics hardware. In
Fifth IEEE International Symposium on Biomedical Imaging (ISBI): From Nano to Macro (Vol. Non-Optical micro-imaging, pp. 1513-1516). IEEE.
https://doi.org/10.1109/ISBI.2008.4540909
del Palacio Gonzalez, A., Thylstrup, B., Pedersen, M. U., Danielsen, B., Kirk, H. B. & Jensen, K. L. (2022).
Design and Testing of an Aftercare Mobile App for Substance Use Among Young Adults: An Interdisicplinary Approach in Denmark. Abstract from Lisbon addictions 2022, Lisabon, Portugal.
Dellana, S. G., Johansson, S., Poulsen, S. B.
, Van Oosterhout, A., Skov, M. & Merritt, T. (2020).
Collaboration around an Interactive Tabletop Map: Comparing Voice Interactions and a Tangible Shape-changing Controller. In J. Cauchard & M. Lochtefeld (Eds.),
MUM 2020 - 19th International Conference on Mobile and Ubiquitous Multimedia, Proceedings (pp. 132-142). Association for Computing Machinery.
https://doi.org/10.1145/3428361.3428395
De Cock . M.
, Dowsley, R., Horst, C., Katti, R., Nascimento, A. C. A., Poon , W.-S. & Truex, S. (2017).
Efficient Privacy-Preserving Scoring of Decision Trees, SVM and Logistic Regression Models.
https://sites.google.com/view/psml/program
Dawson, J. E.
, Clouston, R., Goré, R. & Tiu, A. (2014).
From display calculi to deep nested sequent calculi: Formalised for full intuitionistic linear logic. In J. Diaz, I. L. Lanese & D. Sangiorgi (Eds.),
Theoretical Computer Science: 8th IFIP TC 1/WG 2.2 International Conference, TCS 2014, Rome, Italy, September 1-3, 2014. Proceedings (Vol. 8705 , pp. 250-264). Springer VS.
https://doi.org/10.1007/978-3-662-44602-7_20
Davis, H., Millard, D., Reich, S.
, Bouvin, N. O., Grønbæk, K., Nürnberg, P., Sloth, L., Wiil, U. K.
& Anderson, K. M. (1999).
Interoperability between hypermedia systems: the standardisation work of the OHSWG. In
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots (pp. 201-202). Association for Computing Machinery.
https://doi.org/10.1145/294469.294904
Davi Resende, A. C., Railsback, D., Dowsley, R., Nascimento, A. C. A.
& Aranha, D. F. (2022).
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation.
IEEE Transactions on Information Forensics and Security,
17, 428-442.
https://doi.org/10.1109/TIFS.2022.3144007
Davies, J., Simancik, F., Lyngsø, R.
, Mailund, T. & Hein, J. (2007).
On Recombination-Induced Multiple and Simultaneous Coalescent Events.
Genetics,
177, 2151-2160.
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014).
Universally composable oblivious transfer based on a variant of lPN. In D. Gritzalis, A. Kiayias & I. Askoxylakis (Eds.),
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (pp. 143-158). Springer.
https://doi.org/10.1007/978-3-319-12280-9_10
David, B. M., Nishimaki, R.
, Ranellucci, S. & Tapp, A. (2015).
Generalizing Efficient Multiparty Computation. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 15-32 ). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_2
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015).
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. In M.-H. Au & A. Miyaji (Eds.),
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Vol. 9451, pp. 354-367). Springer VS.
https://doi.org/10.1007/978-3-319-26059-4_20
Daskalakis, C., Karp, R. M., Mossel, E., Riesenfeld, S.
& Verbin, E. (2011).
Sorting and selection in posets.
S I A M Journal on Computing,
40(3), 597-622.
https://doi.org/10.1137/070697720
Da Rocha Pinto, P.
, Dinsdale-Young, T., Gardner, P. & Sutherland, J. (2016).
Modular termination verification for non-blocking concurrency. In P. Thiemann (Ed.),
Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings (Vol. 9632, pp. 176-201). Springer.
https://doi.org/10.1007/978-3-662-49498-1_8