Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14
Andreasen, E., Feldthaus, A., Jensen, S. H., Jensen, C. S., Jonsson, P. A., Madsen, M. & Møller, A. (2012).
Improving Tools for JavaScript Programmers (Position Paper). Paper presented at International Workshop on Scripts to Programs, Beijing, China.
http://cs.au.dk/~amoeller/papers/stop/
Chan, T. M., Durocher, S.
, Larsen, K. G., Morrison, J.
& Wilkinson, B. T. (2012).
Linear-Space Data Structures for Range Mode Query in Arrays.
Leibniz International Proceedings in Informatics,
14, 290-301.
https://doi.org/10.4230/LIPIcs.STACS.2012.290
Dam, P., Lynge Andersen, J., Dalgaard, L. G.
, Grönvall, E., Herborg, H., Pedersen, A., Rossing, C. & Vittrup, C. (2012).
Medicin bestemmer hverdagen.
Tidsskrift for Dansk Sundhedsvaesen,
88(5), 34-41.
Beaudouin-Lafon, M., Chapuis, O., Eagan, J. R.
, Gjerlufsen, T., Huot, S.
, Klokmose, C. N., Mackay, W., Nancel, M., Pietriga, E., Pillias, C., Primet, R. & Wagner, J. (2012).
Multi-surface Interaction in the WILD Room.
Computer,
45(4), 48-56.
https://doi.org/10.1109/MC.2012.110
Moad, S.
, Hansen, M. T., Jurdak, R., Kusy, B., Bouabdallah, N. & Ksentini, A. (2012).
On balancing between minimum energy and minimum delay with radio diversity for wireless sensor networks. In
2012 IFIP Wireless Days (WD) (pp. 1 - 6 ). IEEE Press.
https://doi.org/10.1109/WD.2012.6402840
Klinc, D.
, Hazay, C., Jagmohan, A., Krawczyk, H. & Rabin, T. (2012).
On compression of data encrypted with block ciphers.
I E E E Transactions on Information Theory,
58(11), 6989-7001.
https://doi.org/10.1109/TIT.2012.2210752