Durkota, K., Lisý, W., Kiekintveld, C.
& Bosansky, B. (2015).
Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.),
2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University.
http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. I K. Nyberg (red.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (s. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Gruca, M., Yu, W., Amoateng, P., Agertoug Nielsen, M.
, Poulsen, T. & Balslev, H. (2015).
Ethnomedicinal survey and in vitro anti-plasmodial activity of the palm Borassus aethiopum Mart.
Journal of Ethnopharmacology,
175(356-369), 356-369.
https://doi.org/10.1016/j.jep.2015.09.010
Henriksen, M., Hangstrup, S.
, Work, F. J., Krogsgaard, M., Groom, G. B. & Fox, A. D. (2015).
Flock distributions of Lesser Flamingos Phoeniconaias minor as potential responses to food abundance-predation risk trade-offs at Kamfers Dam, South Africa.
Wildfowl,
65, 3-18.
http://wildfowl.wwt.org.uk/index.php/wildfowl/article/view/2622/1744
Zhang, Y., Chong, M. K.
, Müller, J., Bulling, A. & Gellersen, H. (2015).
Eye tracking for public displays in the wild.
Personal and Ubiquitous Computing,
19(5-6), 967-981.
https://doi.org/10.1007/s00779-015-0866-8
Shegani, M.
, Tsikou, D., Velimirovic, A., Afifi, H., Karayanni, A., Gazivoda, A.
, Manevski, K., Manakos, I. & Livieratos, I. C. (2012).
Citrus Tristeza Virus on the Island of Crete: A Survey and Detection Protocol Applications.
Journal of Plant Pathology,
94(1), 71-78.
https://www.jstor.org/stable/45156010
Döttling, N., Kraschewski, D., Müller-Quade, J. & Nilges, T. (2015).
General statistically secure computation with bounded-resettable hardware tokens. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (s. 319-344). Springer VS.
https://doi.org/10.1007/978-3-662-46494-6_14
Döttling, N. M. & Schröder, D. (2015).
Efficient Pseudorandom Functions via On-the-Fly Adaptation. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (s. 329-350). Springer VS.
https://doi.org/10.1007/978-3-662-47989-6_16
Gambs, S.
, Ranellucci, S. & Tapp, A. (2015).
The crypto-democracy and the trustworthy (position paper). I
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Bind 8872, s. 58-76). Springer VS.
https://doi.org/10.1007/978-3-319-17016-9_5
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Otto, R., Whittaker, R. J., von Gaisberg, M., Stierstorfer, C., Naranjo-Cigala, A.
, Steinbauer, M., Borregaard, M. K., Arévalo, J. R., Garzón-Machado, V., Del Arco, M. & Fernández-Palacios, J. M. (2016).
Transferring and implementing the general dynamic model of oceanic island biogeography at the scale of island fragments: the role of geological age and topography in plant diversification in the Canaries.
Journal of Biogeography,
43(5), 911–922. Artikel 43.
https://doi.org/10.1111/jbi.12684
Schweiger, A., Irl, S. D. H.
, Steinbauer, M., Dengler, J. & Beierkuhnlein, C. (2016).
Optimizing sampling approaches along ecological gradients.
Methods in Ecology and Evolution,
7(4), 463– 471.
https://doi.org/10.1111/2041-210X.12495
Bosansky, B., Branzei, S., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2015).
Computation of Stackelberg Equilibria of Finite Sequential Games. I E. Markakis & G. Schäfer (red.),
Web and Internet Economics: 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Bind 9470, s. 201-215). Springer VS.
http://arxiv.org/abs/1507.07677
Huang, Z., Radunović, B., Vojnović, M.
& Zhang, Q. (2015).
Communication complexity of approximate matching in distributed graphs. I
32nd International Symposium on Theoretical Aspects of Computer Science: STACS’15, March 4–7, 2015, Garching, Germany (s. 460-473). Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.STACS.2015.460
Zhang, X., Odgaard, R.
, Olesen, B., Lauridsen, T. L., Søndergaard, M., Liu, Z.
& Jeppesen, E. (2015).
Warming shows differential effects on late-season growth and competitive capacity of Elodea canadensis and Potamogeton crispus in shallow lakes.
Inland Waters,
5, 421-432.