Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In E. Oswald & M. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015).
Programming and reasoning with guarded recursion for coinductive types. In A. Pitts (Ed.),
Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 305-316). Springer VS.
https://doi.org/10.1007/978-3-662-46678-0_26
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. In T. Walsh (Ed.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (pp. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. In M. Reiter & D. Naccache (Eds.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Vol. 9476, pp. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M.
& Staals, F. (2015).
Segmentation of trajectories on nonmonotone criteria.
A C M Transactions on Algorithms,
12(2), Article 26.
https://doi.org/10.1145/2660772
Nunes, F.
, Verdezoto, N., Fitzpatrick, G.
, Kyng, M., Grönvall, E. & Storni, C. (2015).
Self-Care Technologies in HCI: Trends, Tensions, and Opportunities.
A C M Transactions on Computer - Human Interaction,
22(6), Article 33.
https://doi.org/10.1145/2803173
Clouston, R. & Goré, R. (2015).
Sequent Calculus in the Topos of Trees. In A. Pitts (Ed.),
Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Vol. 9034, pp. 133-147). Springer VS.
http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9
Stisen, A., Blunck, H., Bhattacharya, S.
, Prentow, T. S., Kjærgaard, M. B., Dey, A.
, Sonne, T. & Jensen, M. M. (2015).
Smart devices are different: Assessing and mitigating mobile sensing heterogeneities for activity recognition. In
Proceedings of the 13th ACM Conference on Embedded Network Sensor Systems: Sensys 2015
Prentow, T. S., Ruiz-Ruiz, A.
, Blunck, H., Stisen, A. & Kjærgaard, M. B. (2015).
Spatio-temporal Facility Utilization Analysis from Exhaustive WiFi Monitoring.
Pervasive and Mobile Computing,
16(B), 305–316.
https://doi.org/10.1016/j.pmcj.2014.12.006
Jensen, C. S., Møller, A., Raychev, V., Dimitrov, D. & Vechev, M. (2015).
Stateless Model Checking of Event-Driven Applications. In
OOPSLA 2015 : Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (pp. 57-73). Association for Computing Machinery.
https://doi.org/10.1145/2814270.2814282
Bizjak, A. & Birkedal, L. (2015).
Step-indexed logical relations for probability. In A. Pitts (Ed.),
Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 279-294 ). Springer VS.
https://doi.org/10.1007/978-3-662-46678-0_18
Grønborg, T. K., Hansen, S. N., Nielsen, S., Skytthe, A.
& Parner, E. T. (2015).
Stoppage in Autism Spectrum Disorders.
Journal of Autism and Developmental Disorders,
45(11), 3509-3519.
https://doi.org/10.1007/s10803-015-2497-3
Schmidt, A., Kleemann, M.
, Merritt, T. & Selker, T. (2015).
Tactile Communication in Extreme Contexts: Exploring the Design Space Through Kiteboarding. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (Eds.),
Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 37-54). Springer.
https://doi.org/10.1007/978-3-319-22723-8_4
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Gambs, S.
, Ranellucci, S. & Tapp, A. (2015).
The crypto-democracy and the trustworthy (position paper). In
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Vol. 8872, pp. 58-76). Springer VS.
https://doi.org/10.1007/978-3-319-17016-9_5
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A.
, Bardzell, S., Bardzell, J. & Bjørn, P. (2015).
The Future of Making: Where Industrial and Personal Fabrication Meet.
Aarhus Series on Human Centered Computing,
1(1).
http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857