Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Knudsen, S.
, Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B.
, MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018).
Democratizing Open Energy Data for Public Discourse Using Visualization. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. D406:1-D406:4). Association for Computing Machinery.
https://doi.org/10.1145/3170427.3186539
Neerbek, J., Assent, I. & Dolog, P. (2018).
Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. In D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (Eds.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Vol. 10939, pp. 373-385). Springer VS.
https://doi.org/10.1007/978-3-319-93040-4_30
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D.
& Simkin, M. (2018).
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security,
12(3), 166-183.
https://doi.org/10.1049/iet-ifs.2017.0041
Höök, K., Caramiaux, B., Erkut, C., Forlizzi, J., Hajinejad, N., Haller, M., Hummels, C., Isbister, K., Jonsson, M., Khut, G., Loke, L., Lottridge, D., Marti, P., Melcer, E., Müller, F.
, Petersen, M. G., Schiphorst, T., Segura, E. M., Ståhl, A. ... Tobiasson, H. (2018).
Embracing First-Person Perspectives in Soma-Based Design.
Informatics,
5/1(8), 1-26. Article 2018,5,8.
https://doi.org/10.3390/informatics5010008
Remy, C., Bates, O., Dix, A.
, Thomas, V., Hazas, M., Friday, A. & Huang, E. M. (2018).
Evaluation beyond usability: Validating sustainable HCI research. In
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3173790
Ledo, D., Houben, S.
, Vermeulen, J., Marquardt, N., Oehlberg, L. & Greenberg, S. (2018).
Evaluation Strategies for HCI Toolkit Research. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 36:1-36:17). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3173610
Jensen, K. E., Pedersen, C., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Experiencing Childhood Closer to Green Space is Linked to Lower Schizophrenia Risk.
Early Intervention in Psychiatry,
12(S1), 19-19. Article Talk 3.
Clouston, R. (2018).
Fitch-Style Modal Lambda Calculi. In C. Baier & U. Dal Lago (Eds.),
Foundations of Software Science and Computation Structures - 21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings: 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS) (Vol. 10803, pp. 258-275). Springer.
https://doi.org/10.1007/978-3-319-89366-2_14
Pham, T. H.
, Kristensen, J., Mai, S. T., Assent, I., Jacobsen, J., Vo, B. & Le, A. (2018).
Interactive Exploration of Subspace Clusters on Multicore Processors. In A. Hameurlain, R. Wagner, D. Benslimane, E. Damiani & W. I. Grosky (Eds.),
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX - Special Issue on Database- and Expert-Systems Applications: Special Issue on Database- and Expert-Systems Applications (Vol. 11310, pp. 169-199). Springer VS.
https://doi.org/10.1007/978-3-662-58415-6_6
Thomas, V., Brueggemann, M. J., Wang, D., Darby, A., Wohl, B., Vermeulen, L. M. D., Bates, O. & Feldman, D. (2018).
In the eye of a hurricane there is quiet, for just a moment, -. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-10). Article alt01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3188394
JUNG, RALF.
, KREBBERS, ROBBERT., JOURDAN, JACQUES.-HENRI.
, BIZJAK, ALEŠ., BIRKEDAL, LARS. & DREYER, DEREK. (2018).
Iris from the ground up: A modular foundation for higher-order concurrent separation logic.
Journal of Functional Programming,
28, 1-73. Article e20.
https://doi.org/10.1017/S0956796818000151
Dan, C.
, Hansen, K. A., Jiang, H., Wang, L. & Zhou, Y. (2018).
Low rank approximation of binary matrices: Column subset selection and generalizations. In I. Potapov, J. Worrell & P. Spirakis (Eds.),
43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Vol. 117, pp. 41:1-41:16). Article 41 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2018.41