Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Kjærgaard, M. B., Treu, G. & Linnhoff–Popien, C. (2007). Zone-based RSS Reporting for Location Fingerprinting. In Proceedings of the Fifth International Conference on Pervasive Computing (Pervasive 2007) (pp. 316-333). Springer. https://doi.org/10.1007/978-3-540-72037-9_19
Braun, L., Delpech de Saint Guilhem, C., Jadoul, R., Orsini, E., Smart, N. P. & Tanguy, T. (2023). ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for Z2k. In E. A. Quaglia (Ed.), Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings (Vol. 14421, pp. 137-157). Springer, Cham. https://doi.org/10.1007/978-3-031-47818-58
Giacomelli, I., Madsen, J. & Orlandi, C. (2016). ZKBoo: Faster Zero-Knowledge for Boolean Circuits. In Proceedings of the 25th USENIX Security Symposium: (USENIX Security 16) (pp. 1069-1083). USENIX - The Advanced Computing Systems Association. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_giacomelli.pdf
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. In A.-R. Sadeghi , V. Gligor & M. Yung (Eds.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (pp. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Benarroch, D., Campanelli, M., Fiore, D., Gurkan, K. & Kolonelos, D. (2021). Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. In N. Borisov & C. Diaz (Eds.), Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (pp. 393-414). Springer. https://doi.org/10.1007/978-3-662-64322-8_19
Damgård, I. B. & Cramer, R. (1998). Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? In H. Krawczyk (Ed.), Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23-27, 1998 Proceedings (pp. 424-441). Springer. https://doi.org/10.1007/BFb0055745
Damgård, I. B., Fehr, S. & Salvail, L. (2004). Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. In M. Franklin (Ed.), Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings (pp. 254-272). Springer. https://doi.org/10.1007/978-3-540-28628-8_16
Brandt, J., Damgård, I. B., Landrock, P. & Pedersen, T. P. (1988). Zero-Knowledge Authentication Scheme with Secret Key Exchange (extended abstract). In S. Goldwasser (Ed.), Advances in Cryptology - CRYPTO' 88: Proceedings (pp. 583-588). Springer. https://doi.org/10.1007/0-387-34799-2_43
Kafai, Y. B., Shapiro, R. B., Jetzinger, F., Michaeli, T., Tedre, M., Vartiainen, H., Iivari, N., Musaeus, L. H., Iversen, O. S. & Ali, S. (2025). Youth as Designers of Artificial Intelligence and Machine Learning Technologies: What Do We Know About the Opportunities and Challenges of K-12 Students Creating Their Own Applications? In Proceedings of the 19th International Conference of the Learning Sciences - ICLS 2025 (pp. 2260-2268). International Society of the Learning Sciences (ISLS). https://doi.org/10.22318/icls2014.487
Abdrabou, Y., Schütte, J., Shams, A., Pfeuffer, K., Buschek, D., Khamis, M. & Alt, F. (2022). "Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics. In CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Article 400 Association for Computing Machinery. https://doi.org/10.1145/3491102.3517531
Borchorst, N. G. & Bødker, S. (2011). “You probably shouldn’t give them too much information” – Supporting Citizen-Government Collaboration. In S. Bødker, N. O. Bouvin, W. Lutters, V. Wulf & L. Ciolfi (Eds.), ECSCW 2011: Proceedings of the 12th European Conference on Computer Supported Cooperative Work (pp. 173-192). Springer. https://doi.org/10.1007/978-0-85729-913-0_10
Kristensen, J. F., Eriksen, M. A., Iversen, O. S., Kanstrup, A. M., Nielsen, C. & Petersen, M. G. (2003). Young People In Old Cars - Challenges For Cooperative Design. Paper presented at Information systems research seminar in Scandinavia (IRIS 26) 9-12 August 2003, Haikko Manor, Finland.
Gentry, C., Halevi, S., Krawczyk, H., Magri, B., Nielsen, J. B., Rabin, T. & Yakoubov, S. (2021). YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. In T. Malkin & C. Peikert (Eds.), Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (pp. 64-93). Springer. https://doi.org/10.1007/978-3-030-84245-1_3
Damgård, I., Orlandi, C. & Simkin, M. (2018). Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10992, pp. 799-829). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_27
Larsen, K. G. & Nielsen, J. B. (2018). Yes, There is an Oblivious RAM Lower Bound! In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology -- CRYPTO 2018 (pp. 523-542). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_18
Valencia, R., Condit, R., Foster, R. B., Romoleroux, K., Munoz, G. V., Svenning, J.-C., Magård, E., Bass, M., Losos, E. C., Balslev, H., Losos, E. C. (Ed.) & Leigh, E. G. . J. (Ed.) (2004). Yasuní forest dynamic plot, Ecuador. In Tropical forest diversity and dynamism: Findings from a large-scale plot network (pp. 609-620)
Hansen, N. D., Klarlund, N. & Schwartzbach, M. I. (2000). YakYak: Parsing with Logical Side Constraints. In G. Rozenberg & W. Thomas (Eds.), Proceedings of the 4th International Conference on Development in Language Theory (pp. 286-301). World Scientific.
Jarzabek, S., Basset, P., Zhang, H. & Zhang, W. (2003). XVCL: XML-based Variant Configuration Language. In 24th International Conference on Software Engineering (ICSE 2003) (pp. 810-811). IEEE Computer Society Press.
Christensen, B. G., Hansen, F. A. & Bouvin, N. O. (2003). Xspect: bridging open hypermedia and XLink. In Proceedings of the 12th international conference on World Wide Web (pp. 490-499). Association for Computing Machinery. https://doi.org/10.1145/775152.775222
Evangelista Belo, J. M., Feit, A. M., Feuchtner, T. & Grønbæk, K. (2021). XRgonomics: Facilitating the Creation of Ergonomic 3D Interfaces. In CHI 2021 - Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths (pp. 1-11). Article 290 Association for Computing Machinery. https://doi.org/10.1145/3411764.3445349
Møller, A. & Schwartzbach, M. I. (2007). XML Graphs in Program Analysis. In G. Ramalingam & E. Visser (Eds.), Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (pp. 1-10). Association for Computing Machinery. https://doi.org/10.1145/1244381.1244383
Christensen, B. G. & Hansen, F. A. (2002). XLink - Linking the Web and Open Hypermedia. Paper presented at The International Workshop on Open Hypermedia Systems Core Concepts and Research Directions (OHS 2002), College Park, Maryland, United States.
Botero, A., Van Amste, F., Seravalli, A. & Saad-Sulonen, J. (2015). WS co-designing and commoning. Nordic Design Research, 2015(6). http://www.nordes.org/opj/index.php/n13/article/view/422
Arge, L. A. (2009). Worst-Case Efficient Range Searching: Invited Tutorial 2. In J. Paredaens & J. Su (Eds.), 28th Symposium on Principles of Database Systems: Proceedings (pp. 175-176). Association for Computing Machinery. https://doi.org/10.1145/1559795.1559822
Brodal, G. S. (1996). Worst-case efficient priority queues. In Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms (pp. 52-58). Society for Industrial and Applied Mathematics.
Brodal, G. S. & Katajainen, J. (1998). Worst-case efficient external-memory priority queues. In S. Arnborg & L. Ivansson (Eds.), Algorithm Theory — SWAT'98: 6th Scandinavian Workshop on Algorithm Theory Stockholm, Sweden, July 8–10, 1998 Proceedings (pp. 107-118). Springer. https://doi.org/10.1007/BFb0054359
Brodal, G. S. (1997). Worst Case Efficient Data Structures. Department of Computer Science, Aarhus University.
Mogensen, P. (2001). Workspace - distributed work support through spatial computing environments. Paper presented at Disappearing Computer Jamboree, Zürich, Switzerland.
Christensen, M. (2003). WorkSPACE: Augmenting the work environment through spatial artifacts. Paper presented at MILK Conference - Designing Work Spaces of the Future, Bruxelles, Belgium. http://www.milkforum.com
Christensen, M. (2003). WorkSPACE. Paper presented at Workspace Venezia 2003 - Shaping the future workspace - Essential Tools for the future, Venedig, Italy. http://e-locus.fundaciontekniker.com/venezia03/
Mark, B., Peter, W., McCarthy, J. & Bertelsen, O. W. (2006). Workshops: Theory and method for experience centered design. In G. M. Olson & R. Jeffries (Eds.), CHI '06: extended abstracts on Human factors in computing systems CHI '06 (pp. 1691-1695). Association for Computing Machinery. https://doi.org/10.1145/1125451.1125764
Bertelsen, O. W., Marti, P. & Shapiro, D. (2006). Workshop on Ambient Computing in a Critical, Quality of Life Perspective Aarhus, Denmark, 21 August 2005 - as part of the Fourth Aarhus Conference. In The 4th decennial conference on Critical computing: between sense and sensibility 2005, Aarhus, Denmark
Duckert, M., Hoggan, E., Barkhuus, L., Bjørn, P., Boulus-Rodje, N., Bødker, S., Møller, N. H. & Shklovski, I. (2022). Work of the Future. In Participative Computing for Sustainable Futures: Adjunct Proceedings of the 12th Nordic Conference on Human-Computer Interaction (NordiCHI'22) Article 3 Association for Computing Machinery. https://doi.org/10.1145/3547522.3547707
Ciaperoni, M., Aslay, C., Gionis, A. & Mathioudakis, M. (2022). Workload-Aware Materialization of Junction Trees. In Proceedings of the 25th International Conference on Extending Database Technology (pp. 65-77). Universität Konstanz. https://doi.org/10.5441/002/edbt.2022.06
Aslay, C., Ciaperoni, M., Gionis, A. & Mathioudakis, M. (2021). Workload-aware materialization for efficient variable elimination on Bayesian networks. In Proceedings - 2021 IEEE 37th International Conference on Data Engineering, ICDE 2021 (pp. 1152-1163). Article 9458677 IEEE. https://doi.org/10.1109/ICDE51399.2021.00104
Korsgaard, H., Thiel, S. K., Thomas, V. & Ertiö, T. (2018). Working across boundaries in smart city research. In C. C. Hinnant & A. Zuiderwijk (Eds.), Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age Article 39 Association for Computing Machinery. https://doi.org/10.1145/3209281.3209315
Lassen, K. B. & van der Aalst, W. M. P. (2007). WorkflowNet2BPEL4WS: A Tool for Translating Unstructured Workflow Processes to Readable BPEL. In On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE (4275 of Lecture Notes in Computer Science ed., pp. 127-144). Springer.