Christian D. Jensen

  1. Research › Article in proceedings
  2. Published

    A Unified Security Framework for Networked Applications. / Abendroth, Joerg; Jensen, Christian D.

    Eighteenth ACM Symposium on Applied Computing. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  3. Published

    Partial Outsourcing: A New Paradigm for Access Control. / Abendroth, Joerg; Jensen, Christian D.

    8th ACM Symposium on Access Control Models and |Technologies. 2003. p. 134-141.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  4. Published

    A Mechanism for Identity Delegation at Authentication Level. / Ahmed, Naveed; Jensen, Christian D.

    Identity and Privacy in the Internet Age, Proceedings: Lecture Notes in Computer Science. Vol. 5838 Springer, 2009. p. 148-162.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  5. Published

    Context-Aware Identity Delegation. / Ahmed, Naveed; Jensen, Christian D.

    Euro CAT 2009. Vol. CEUR-WS volume (CEUR-WS.org - ISSN 1613-0073) 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  6. Published

    Definition of Entity Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Proceedings of 2nd International Workshop on Security and Communication Networks (IWSCN), 2010. IEEE Xplore, 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  7. Published

    Demarcation of Security in Authentication Protocols. / Ahmed, Naveed; Jensen, Christian D.

    2011 First SysSec Workshop (SysSec). IEEE, 2011. p. 43-50.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  8. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  9. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  10. Published

    Kaffemik - A distributed JVM featuring a single Address Space Architecture. / Andersson, Johan; Weber, Stefan; Cecchet, Emmanuel; Jensen, Christian D.; Cahill, Vinny.

    USENIX JVM'01, Monterey, CA, April 23-24. 2001.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2001

  11. Published

    kaffemik - A distributed JVM on a single Address Space Architecture. / Andersson, Johan; Weber, Stefan; Cecchet, Emmanuel; Jensen, Christian D.; Cahill, Vinny.

    SCI Europe 2001 conference. Dublin 06 August. 2001.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2001

Previous 1 2 3 4 5 6 7 8 ...10 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word