Naveed Ahmed

  1. 2014
  2. Published

    Enabling short fragments for uncoordinated spread spectrum communication. / Ahmed, Naveed; Pöpper, Christina; Capkun, Srdjan.

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Vol. 8712 Springer International Publishing, 2014. p. 488-507 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  3. 2012
  4. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  5. Published

    Structured Intuition: A Methodology to Analyse Entity Authentication. / Ahmed, Naveed; Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 191 p. (IMM-PHD-2012; No. 276).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  6. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  7. 2011
  8. Published

    Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. / Ahmed, Naveed; Jensen, Christian D.

    In: Lecture Notes in Computer Science, Vol. 6542, 2011, p. 234-247.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  9. Published

    Demarcation of Security in Authentication Protocols. / Ahmed, Naveed; Jensen, Christian D.

    2011 First SysSec Workshop (SysSec). IEEE, 2011. p. 43-50.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  10. Published

    Security of Dependable Systems. / Ahmed, Naveed; Jensen, Christian D.

    Dependability and Computer Engineering: Concepts for Software Intensive Systems. ed. / Luigia Petre. 1. ed. IGI global, 2011. p. 230-264.

    Publication: Education - peer-reviewBook chapter – Annual report year: 2011

  11. Published

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). / Ahmed, Naveed (Editor); Quercia, D. (Editor); Jensen, Christian D. (Editor).

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  12. 2010
  13. Published

    Adaptable Authentication Model - for Exploring the Weaker Notions of Security. / Ahmed, Naveed; Jensen, Christian D.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-17).

    Publication: ResearchReport – Annual report year: 2010

  14. Published

    Definition of Entity Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Proceedings of 2nd International Workshop on Security and Communication Networks (IWSCN), 2010. IEEE Xplore, 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

Previous 1 2 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word