Christian D. Jensen

  1. 2014
  2. Submitted

    Resilient Infrastructure and Building Security. / Ingwar, Mads Ingerslew; Jensen, Christian D. (Main supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2014. 152 p. (DTU Compute PHD-2014; No. 322).

    Publication: ResearchPh.D. thesis – Annual report year: 2014

  3. 2012
  4. Published

    Document and author promotion strategies in the secure wiki model. / Lindberg, Kasper; Jensen, Christian D.

    In: IFIP AICT - Advances in Information and Communication technology, Vol. 374, 2012, p. 247-252.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  5. Published

    A collaborative approach to botnet protection. / Stevanovic, Matija; Revsbech, Kasper; Pedersen, Jens Myrup; Sharp, Robin; Jensen, Christian D.

    In: Lecture Notes in Computer Science, Vol. 7465, 2012, p. 624-638.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  6. Published

    First Workshop on Incentives and Trust in E-Commerce (WIT-EC’12). / Marsh, Stephen (Editor); Zhang, Jie (Editor); Jensen, Christian D. (Editor).

    2012. 102 p.

    Publication: ResearchBook – Annual report year: 2012

  7. Published

    Structured Intuition: A Methodology to Analyse Entity Authentication. / Ahmed, Naveed; Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 191 p. (IMM-PHD-2012; No. 276).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  8. Submitted

    Attacker Modelling in Ubiquitous Computing Systems. / Papini, Davide; Sharp, Robin (Main supervisor); Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 154 p. (IMM-PHD-2012; No. 295).

    Publication: ResearchPh.D. thesis – Annual report year: 2013

  9. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  10. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  11. Published

    Collaborative trust evaluation for wiki security. / Lindberg, Kasper; Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 176-184.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  12. Published

    The Role of Trust in Computer Security. / Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 236.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...10 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word