Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. In
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems [3376379] Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Rossitto, C., Lampinen, A.
, Bødker, S., Light, A., Berns, K. & Hui, J. (2020).
Reconsidering scale and scaling in CSCW research. In
CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (pp. 493-501). Association for Computing Machinery. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW
https://doi.org/10.1145/3406865.3419409
Zardbani, F., Afshani, P. & Karras, P. (2020).
Revisiting the theory and practice of database cracking. In A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (Eds.),
Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (pp. 415-418). openproceedings.org. Advances in Database Technology - EDBT Vol. 2020-March
https://doi.org/10.5441/002/edbt.2020.46
Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages,
4(ICFP), [114].
https://doi.org/10.1145/3408996
Arge, L., Rav, M., Revsbæk, M.
, Shin, Y. & Yang, J. (2020).
Sea-rise flooding on massive dynamic terrains. In S. Albers (Ed.),
17th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2020 (pp. 6:1-6:19). Schloss Dagstuhl--Leibniz-Zentrum für Informatik. Leibniz International Proceedings in Informatics, LIPIcs Vol. 162 Leibniz International Proceedings in Informatics
https://doi.org/10.4230/LIPIcs.SWAT.2020.6
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer. Lecture Notes in Computer Science Vol. 12309
https://doi.org/10.1007/978-3-030-59013-0_32
Nielsen, J. B. & Spitters, B. (2020).
Smart contract interactions in coq. In E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (Eds.),
Formal Methods- FM 2019 International Workshops - Revised Selected Papers (pp. 380-391). Springer. Lecture Notes in Computer Science Vol. 12232
https://doi.org/10.1007/978-3-030-54994-7_29
Damgård, I., Haagh, H., Mercer, R.
, Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020).
Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.),
Theory of Cryptography: Proceedings (Vol. II, pp. 229-260). Springer. Lecture Notes in Computer Science Vol. 12551
https://doi.org/10.1007/978-3-030-64378-2_9
Teli, M., Foth, M., Sciannamblo, M., Anastasiu, I.
& Lyle, P. J. (2020).
Tales of Institutioning and Commoning: Participatory Design Processes with a Strategic and Tactical Perspective. In C. Del Gaudio, L. Parra-Agudelo, R. Clarke, J. Saad-Sulonen, A. Botero, A. Botero, F. C. Londono, F. C. Londono & P. A. Escandon Suarez (Eds.),
Proceedings of the 16th Participatory Design Conference 2020 (PDC2020 ed., Vol. 1, pp. 159-171). Association for Computing Machinery. Proceedings of the Participatory Design Conference
https://doi.org/10.1145/3385010.3385020
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. In M. H. ter Beek & D. Nickovic (Eds.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (pp. 3-69). Springer. Lecture Notes in Computer Science Vol. 12327
https://doi.org/10.1007/978-3-030-58298-2_1
Tsitsulin, A., Munkhoeva, M.
, Mottin, D., Karras, P., Bronstein, A., Oseledets, I. & Müller, E. (2020).
The Shape of Data: Intrinsic Distance for Data Distributions. Paper presented at The International Conference on Learning Representations (ICLR), Ababa, Ethiopia.
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) [5] Schloss Dagstuhl--Leibniz-Zentrum für Informatik. Leibniz International Proceedings in Informatics, LIPIcs Vol. 163
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Baum, C., Cozzo, D. & P. Smart, N. (2020).
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.),
Selected Areas in Cryptography - SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer. Lecture Notes in Computer Science Vol. 11959
https://doi.org/10.1007/978-3-030-38471-5_12
Mathiasen, A., Hvilshøj, F., Jørgensen, J. R., Nasery, A.
& Mottin, D. (2020).
What if Neural Networks had SVDs? In H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan & H. Lin (Eds.),
Advances in Neural Information Processing Systems 33 pre-proceedings (NeurIPS 2020)
Jetter, H-C.
, Rädle, R., Feuchtner, T., Anthes, C., Friedl, J.
& Klokmose, C. N. (2020).
“In VR, everything is possible!”: Sketching and Simulating Spatially-Aware Interactive Spaces in Virtual Reality. In
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems [523] Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376652