default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Thomas P. Jakobsen
aka: Thomas Pelle Jakobsen
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2024
- Rune Sejer Jakobsen, Thomas Dyhre Nielsen, Peter Leutscher, Kristoffer Koch:
A study on the risk stratification for patients within 24 hours of admission for risk of hospital-acquired urinary tract infection using Bayesian network models. Health Informatics J. 30(1) (2024) - 2023
- Thomas Bjørner, Mads Strømberg Petersen, Niklas Lee Skjold Hansen, Gustav Søgaard Jakobsen, Daniel Bredgaard Hendriksen:
How can a foundation be outlined for a successful serious game to increase reading engagement. Int. J. Serious Games 10(1): 81-95 (2023) - Mohammad Naghavi-Behzad, Marianne Vogsen, Oke Gerke, Sara Elisabeth Dahlsgaard-Wallenius, Henriette Juel Nissen, Nick Møldrup Jakobsen, Poul-Erik Braad, Mie Holm Vilstrup, Paul Deak, Malene Grubbe Hildebrandt, Thomas Lund Andersen:
Comparison of Image Quality and Quantification Parameters between Q.Clear and OSEM Reconstruction Methods on FDG-PET/CT Images in Patients with Metastatic Breast Cancer. J. Imaging 9(3): 65 (2023) - 2022
- Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard:
Fast threshold ECDSA with honest majority. J. Comput. Secur. 30(1): 167-196 (2022) - Mads Strømberg Petersen, Niklas Lee Skjold Hansen, Gustav Søgaard Jakobsen, Daniel Henriksen, Thomas Bjørner:
Making Fiscal Policy Engaging for Students in Social Studies by Used Game-Based Learning. DLI 2022: 153-167 - Steffan Christ Sølvsten, Jaco van de Pol, Anna Blume Jakobsen, Mathias Weller Berg Thomasen:
Adiar Binary Decision Diagrams in External Memory. TACAS (2) 2022: 295-313 - 2021
- Mads Strømberg Petersen, Gustav Søgaard Jakobsen, Daniel Bredgaard Hendriksen, Niklas Lee Skjold Hansen, Thomas Bjørner:
Can a Serious Game Be Designed to Increase Engagement in a Mandatory Postmodern Novella at Danish Gymnasiums? GALA 2021: 57-67 - Peter Øhrstrøm, Steinar Thorvaldsen, Ulrik Sandborg-Petersen, Thomas Ploug, David Jakobsen:
The Use of E-learning Tools in a Basic Logic Course During the COVID-19 Lockdown. ICITL 2021: 121-130 - Steffan Christ Sølvsten, Jaco van de Pol, Anna Blume Jakobsen, Mathias Weller Berg Thomasen:
Efficient Binary Decision Diagram Manipulation in External Memory. CoRR abs/2104.12101 (2021) - 2020
- Mads Strømberg Petersen, Niklas Lee Skjold Hansen, Gustav Søgaard Jakobsen, Thomas Bjørner:
Increasing Reading Engagement for Danish Gymnasium Students: The Hosier and His Daughter as a Serious Game. DLI 2020: 187-197 - Peter Øhrstrøm, Steinar Thorvaldsen, Ulrik Sandborg-Petersen, Thomas Ploug, David Jakobsen:
The Use of E-learning Tools and Log Data in a Course on Basic Logic. ICITL 2020: 610-620 - Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård:
Fast Threshold ECDSA with Honest Majority. SCN 2020: 382-400 - Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård:
Fast Threshold ECDSA with Honest Majority. IACR Cryptol. ePrint Arch. 2020: 501 (2020) - 2016
- Thomas Bro Wormslev Jakobsen, David Jakobsen, Peter Øhrstrøm:
Investigating Worldviews with Protégé. CSTIW@ICCS 2016: 28-36 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
On the Complexity of Additively Homomorphic UC Commitments. TCC (A1) 2016: 542-565 - Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation. IACR Cryptol. ePrint Arch. 2016: 37 (2016) - 2015
- Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2015: 309 (2015) - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:
On the Complexity of Additively Homomorphic UC Commitments. IACR Cryptol. ePrint Arch. 2015: 694 (2015) - 2014
- Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation. CCSW 2014: 81-92 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen:
Faster Maliciously Secure Two-Party Computation Using the GPU. SCN 2014: 358-379 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen:
Faster Maliciously Secure Two-Party Computation Using the GPU. IACR Cryptol. ePrint Arch. 2014: 270 (2014) - 2013
- Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions. EUROCRYPT 2013: 537-556 - Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter:
Secure Key Management in the Cloud. IMACC 2013: 270-289 - Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter:
Secure Key Management in the Cloud. IACR Cryptol. ePrint Arch. 2013: 629 (2013) - Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions. IACR Cryptol. ePrint Arch. 2013: 155 (2013) - 2010
- Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen:
Efficient Implementation of the Orlandi Protocol. ACNS 2010: 255-272 - Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen:
Efficient Implementation of the Orlandi Protocol Extended Version. IACR Cryptol. ePrint Arch. 2010: 224 (2010) - 2009
- Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas P. Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft:
Secure Multiparty Computation Goes Live. Financial Cryptography 2009: 325-343 - 2008
- Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas P. Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft:
Multiparty Computation Goes Live. IACR Cryptol. ePrint Arch. 2008: 68 (2008) - 2006
- Peter Bogetoft, Ivan Damgård, Thomas P. Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft:
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. Financial Cryptography 2006: 142-147
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 21:40 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint