Christian D. Jensen

  1. Research › Book chapter
  2. Published

    User-centric Identity, Trust and Privacy. / Seigneur, Jean-Marc; Jensen, Christian D.

    Trust in E-Services: Technologies, Practices and Challenges. dea Group Publishing, 2007.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2007

  3. Published

    Trust Management V : 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011, Proceedings. / Wakeman, I. (Editor); Gudes, E. (Editor); Jensen, Christian D. (Editor); Crampton, J. (Editor).

    Trust Management V. Springer, 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  4. Research › Article in proceedings
  5. Published

    A Unified Security Framework for Networked Applications. / Abendroth, Joerg; Jensen, Christian D.

    Eighteenth ACM Symposium on Applied Computing. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  6. Published

    Partial Outsourcing: A New Paradigm for Access Control. / Abendroth, Joerg; Jensen, Christian D.

    8th ACM Symposium on Access Control Models and |Technologies. 2003. p. 134-141.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  7. Published

    A Mechanism for Identity Delegation at Authentication Level. / Ahmed, Naveed; Jensen, Christian D.

    Identity and Privacy in the Internet Age, Proceedings: Lecture Notes in Computer Science. Vol. 5838 Springer, 2009. p. 148-162.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  8. Published

    Context-Aware Identity Delegation. / Ahmed, Naveed; Jensen, Christian D.

    Euro CAT 2009. Vol. CEUR-WS volume (CEUR-WS.org - ISSN 1613-0073) 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  9. Published

    Definition of Entity Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Proceedings of 2nd International Workshop on Security and Communication Networks (IWSCN), 2010. IEEE Xplore, 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  10. Published

    Demarcation of Security in Authentication Protocols. / Ahmed, Naveed; Jensen, Christian D.

    2011 First SysSec Workshop (SysSec). IEEE, 2011. p. 43-50.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  11. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  12. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...10 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word