Naveed Ahmed

  1. 2012
  2. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  3. Published

    Structured Intuition: A Methodology to Analyse Entity Authentication. / Ahmed, Naveed; Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 191 p. (IMM-PHD-2012; No. 276).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  4. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  5. 2011
  6. Published

    Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. / Ahmed, Naveed; Jensen, Christian D.

    In: Lecture Notes in Computer Science, Vol. 6542, 2011, p. 234-247.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  7. Published

    Demarcation of Security in Authentication Protocols. / Ahmed, Naveed; Jensen, Christian D.

    2011 First SysSec Workshop (SysSec). IEEE, 2011. p. 43-50.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  8. Published

    Security of Dependable Systems. / Ahmed, Naveed; Jensen, Christian D.

    Dependability and Computer Engineering: Concepts for Software Intensive Systems. ed. / Luigia Petre. 1. ed. IGI global, 2011. p. 230-264.

    Publication: Education - peer-reviewBook chapter – Annual report year: 2011

  9. Published

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). / Ahmed, Naveed (Editor); Quercia, D. (Editor); Jensen, Christian D. (Editor).

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  10. 2010
  11. Published

    Adaptable Authentication Model - for Exploring the Weaker Notions of Security. / Ahmed, Naveed; Jensen, Christian D.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-17).

    Publication: ResearchReport – Annual report year: 2010

  12. Published

    Definition of Entity Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Proceedings of 2nd International Workshop on Security and Communication Networks (IWSCN), 2010. IEEE Xplore, 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  13. Published

    Entity Authentication:Analysis using Structured Intuition. / Ahmed, Naveed; Jensen, Christian D.

    Technical Report on NODES10 Proceedings. 2010.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2010

Previous 1 2 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word