Eerikson, H., Keller, M.
, Orlandi, C., Pullonen, P., Puura, J. & Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Article 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Mathiasen, N. R. (2007).
Usable Security Revisited. Poster session presented at Danish HCI Research Symposium, DHRS 2007, København, Denmark.
Brynskov, M., Bermúdez, J. C. C., Fernández, M.
, Korsgaard, H., Mulder, I., Piskorek, K., Rekow, L. & de Waal, M. (2014).
Urban Interaction Design: Towards City Making. Urban IxD Booksprint.
http://static1.squarespace.com/static/50f5c859e4b083caad2ed6a0/t/5395d6a5e4b0fc0456d8d5a3/1402328741769/UrbanIxD_towardsCityMaking.pdf
Kjærgaard, M. B. & Blunck, H. (2012).
Unsupervised Power Profiling for Mobile Devices. In A. Puiatti & T. Gu (Eds.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (pp. 138-149). Springer.
https://doi.org/10.1007/978-3-642-30973-1_12
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014).
Universally composable oblivious transfer based on a variant of lPN. In D. Gritzalis, A. Kiayias & I. Askoxylakis (Eds.),
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (pp. 143-158). Springer.
https://doi.org/10.1007/978-3-319-12280-9_10
Křivánek, J., Georgiev, I., Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014).
Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation.
A C M Transactions on Graphics,
33(4), Article 13.
https://doi.org/10.1145/2601097.2601219
Torgersen, M. (2001).
Unifying Abstractions. (DAIMI PhD Dissertation PD-01-2 ed.) Department of Computer Science.
Saad-Sulonen, J.
, Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015).
Unfolding Participation: What do we mean by participation – conceptually and in practice.
Aarhus Series on Human Centered Computing ,
1(1).
https://doi.org/10.7146/aahcc.v1i1.21324
Damgård, I. B., Fehr, S., Morozov, K. & Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20