David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014).
Universally composable oblivious transfer based on a variant of lPN. In D. Gritzalis, A. Kiayias & I. Askoxylakis (Eds.),
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (pp. 143-158). Springer.
https://doi.org/10.1007/978-3-319-12280-9_10
Křivánek, J., Georgiev, I.
, Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014).
Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation.
A C M Transactions on Graphics,
33(4), Article 13.
https://doi.org/10.1145/2601097.2601219
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015).
Unfolding Participation: What do we mean by participation – conceptually and in practice.
Aarhus Series on Human Centered Computing ,
1(1).
https://doi.org/10.7146/aahcc.v1i1.21324
Damgård, I. B., Fehr, S., Morozov, K.
& Salvail, L. (2004).
Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.),
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer.
https://doi.org/10.1007/978-3-540-24638-1_20
Beldiceanu, N.
, Katriel, I. & Lorca, X. (2006).
Undirected Forest Constraints. In
Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2006) (Vol. LNCS 3990, pp. 29-43). Springer.
Chundury, P., Thakkar, U., Reyazuddin, Y., Jordan, J. B.
, Elmqvist, N. & Lazar, J. (2024).
Understanding the Visualization and Analytics Needs of Blind and Low-Vision Professionals. In
ASSETS 2024 - Proceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility Article 111 Association for Computing Machinery.
https://doi.org/10.1145/3663548.3688496
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Damgård, I. B., Nielsen, J. B., Toft, T., Kiltz, E.
& Fitzi, M. (2006).
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. In S. Halevi & T. Rabin (Eds.),
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (pp. 285-304). Springer.
https://doi.org/10.1007/11681878_15