Bilstrup, K.-E. K., Kaspersen, M. H., Lunding, M. S., Schaper, M.-M. A., Van Mechelen, M., Tamashiro, M. A.
, Smith, R. C., Iversen, O. S. & Petersen, M. G. (2022).
Supporting Critical Data Literacy in K-9 Education: Three Principles for Enriching Pupils’ Relationship to Data. In
Proceedings of Interaction Design and Children, IDC 2022 (pp. 225-236). Association for Computing Machinery.
https://doi.org/10.1145/3501712.3530783
MacIntyre, B., Mynatt, E. D., Voida, S., Hansen, K. M., Tullio, J. & Corso, G. M. (2001).
Support for Multitasking and background Awareness Using Interactive Peripheral Displays. In J. Marks & E. D. Mynatt (Eds.),
Proceedings of the 14th annual ACM symposium on User interface software and technology (pp. 41-50). Association for Computing Machinery.
https://doi.org/10.1145/502348.502355
Damgård, I. B., Funder, J.
, Nielsen, J. B. & Salvail, L. (2014).
Superposition attacks on cryptographic protocols. In C. Padró (Ed.),
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (pp. 142-161). Springer.
https://doi.org/10.1007/978-3-319-04268-8_9
Miltersen, P. B., Vinodchandran, N. V. & Watanabe, O. (1999).
Super-Polynomial Versus Half-Exponential Circuit Size in the Exponential Hierarchy. In T. Asano, H. Imai, D. T. Lee, S. Nakano & T. Tokuyama (Eds.),
Computing and Combinatorics: 5th Annual International Conference, COCOON'99 Tokyo, Japan, July 26-28, 1999 Proceedings (pp. 210-220). Springer.
https://doi.org/10.1007/3-540-48686-0_21
Nielsen, J. B. (Ed.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007).
Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Campanelli, M.
& Khoshakhlagh, H. (2021).
Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 607-631). Springer.
https://doi.org/10.1007/978-3-030-92518-5_27
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. In
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Vol. 2, pp. 1256-1271). Association for Computing Machinery.
Riedel, C., Michael, G. G., Orgel, C., Baum, C., van der Bogert, C. H. & Hiesinger, H. (2021).
Studying the Global Spatial Randomness of Impact Craters on Mercury, Venus, and the Moon With Geodesic Neighborhood Relationships.
Journal of Geophysical Research: Planets,
126(3), Article e2020JE006693.
https://doi.org/10.1029/2020JE006693
Campanelli, M., Francati, D.
& Orlandi, C. (2023).
Structure-Preserving Compilers from New Notions of Obfuscations. In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 663-693). Springer.
https://doi.org/10.1007/978-3-031-31371-4_23
Svenning, J.-C., Dalsgaard, B., Kissling, W. D., Lenoir, J. R. M. H. & Sandel, B. S. (2011).
Strong paleoclimatic imprints on ecological patterns and function across scales. Abstract from 12th European Ecological Federation Congress, Avila, Spain.
Damgård, I., Haagh, H., Mercer, R., Nitulescu, A.
, Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer.
https://doi.org/10.1007/978-3-030-64378-2_9
Aggarwal, D.
, Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M. (2019).
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer.
https://doi.org/10.1007/978-3-030-26951-7_18
Triandopoulos, N., Cornelius, C., Kapadia, A., Kotz, D., Peebles, D. & Shin, M. (2008).
Anonysense: privacy-aware people-centric sensing. In
Proceeding of the 6th international conference on Mobile systems, applications, and services (pp. 211-224). Association for Computing Machinery.
https://doi.org/10.1145/1378600.1378624