Christian D. Jensen

  1. Published

    The Claim Tool Kit for ad hoc recognition of peer entities. / Seigneur, Jean-Marc; Jensen, Christian D.

    In: Science of Computer Programming, Vol. 54, No. 1, 2005, p. 49-71.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  2. Published

    The Role of Identity in Computational Trust. / Seigneur, Jean-Marc; Jensen, Christian D.

    Proceedings of The First Workshop on Security and Privacy at the Conference on Pervasive Computing. 2004.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  3. Published

    The Role of Trust in Computer Security. / Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 236.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2012

  4. Published

    The Role of Trust in Persistent Authentication. / Jensen, Christian D.

    Workshop Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010): Proceedings of the Joint International Workshop on Trust in Location and Communications in Decentralized Computing (TruLoCo 2010). 2010. p. 41-52.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  5. Published

    Towards Secure Intelligent Buildings. / Ingwar, Mads Ingerslew; Jensen, Christian D.

    Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11). 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  6. Published

    Towards security auto-configuration for smart appliances. / Seigneur, Jean-Marc; Farrell, Stephen; Jensen, Christian D.; Gray, Elizabeth; Chen, Yong.

    Proceedings of the Smart Objects Conference. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  7. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    Trading Privacy for Trust. / Seigneur, Jean-Marc; Jensen, Christian D.

    Proceedings of the 2nd International Conference on Trust Management. 2004.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  9. Published

    Trajectory Based Addressing. / Farrell, Stephen; Jensen, Christian D.

    8th Cabernet Radicals Workshop. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  10. Published

    Trust-Based Route Selection in Dynamic Source Routin. / Jensen, Christian D.; Connell, Paul O.

    4th International Conference on Trust Management. Springer Verlag, 2006. p. 150-163.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word