Christian D. Jensen

  1. Published

    Structured Intuition: A Methodology to Analyse Entity Authentication. / Ahmed, Naveed; Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 191 p. (IMM-PHD-2012; No. 276).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  2. Published

    Supporting Multi-Agent Reputation Calculation in the Wikipedia Recommender System. / Jensen, Christian D.

    In: I E T Information Security, Vol. 4, No. 4, 2010, p. 273-282.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  3. Published

    The Claim Tool Kit for ad hoc recognition of peer entities. / Seigneur, Jean-Marc; Jensen, Christian D.

    In: Science of Computer Programming, Vol. 54, No. 1, 2005, p. 49-71.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  4. Published

    The importance of trust in computer security. / Jensen, Christian D.

    Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014). ed. / Jianying Zhou; Nurit Gal-Oz; Jie Zhang; Ehud Gudes. Springer, 2014. p. 1-12 (IFIP AICT - Advances in Information and Communication technology, Vol. 430).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  5. Published

    The Role of Identity in Computational Trust. / Seigneur, Jean-Marc; Jensen, Christian D.

    Proceedings of The First Workshop on Security and Privacy at the Conference on Pervasive Computing. 2004.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  6. Published

    The Role of Trust in Computer Security. / Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 236.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2012

  7. Published

    The Role of Trust in Persistent Authentication. / Jensen, Christian D.

    Workshop Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010): Proceedings of the Joint International Workshop on Trust in Location and Communications in Decentralized Computing (TruLoCo 2010). 2010. p. 41-52.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  8. Published

    Towards Secure Intelligent Buildings. / Ingwar, Mads Ingerslew; Jensen, Christian D.

    Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11). 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  9. Published

    Towards security auto-configuration for smart appliances. / Seigneur, Jean-Marc; Farrell, Stephen; Jensen, Christian D.; Gray, Elizabeth; Chen, Yong.

    Proceedings of the Smart Objects Conference. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  10. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word