The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Damsgaard Jensen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Damsgaard Jensen, Daniel Hagimont
    Protection Reconfiguration for Reusable Software. [Citation Graph (0, 0)][DBLP]
    CSMR, 1998, pp:74-81 [Conf]
  2. Benjamin Aziz, Christian Damsgaard Jensen
    Adaptability in CORBA: The Mobile Proxy Approach. [Citation Graph (0, 0)][DBLP]
    DOA, 2000, pp:295-304 [Conf]
  3. Christian Damsgaard Jensen, George Coulouris, Daniel Hagimont
    ECOOP Workshop on Distributed Object Security. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:273-276 [Conf]
  4. Christian Damsgaard Jensen, Daniel Hagimont
    Mutual Suspicion in a Generic Object-Support System. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:278- [Conf]
  5. Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray
    Risk Probability Estimating Based on Clustering. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:229-233 [Conf]
  6. Christian Damsgaard Jensen
    Fingerprinting Text in Logical Markup Languages. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:433-445 [Conf]
  7. Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen
    Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:321-337 [Conf]
  8. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Trading Privacy for Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:93-107 [Conf]
  9. Elizabeth Gray, Jean-Marc Seigneur, Yong Chen, Christian Damsgaard Jensen
    Trust Propagation in Small Worlds. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:239-254 [Conf]
  10. Christian Damsgaard Jensen, Paul O'Connell
    Trust-Based Route Selection in Dynamic Source Routing. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:150-163 [Conf]
  11. Johan Andersson, Stefan Weber, Christian Damsgaard Jensen, Vinny Cahill
    PEM3 - The Policy Enhanced Memory Management Model. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:194-197 [Conf]
  12. Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
    Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:89-101 [Conf]
  13. Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen
    Combating Spam with TEA. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:47-58 [Conf]
  14. Joerg Abendroth, Christian Damsgaard Jensen
    A Unified Security Framework for Networked Applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:351-357 [Conf]
  15. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Trust enhanced ubiquitous payment without too much privacy loss. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1593-1599 [Conf]
  16. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1569- [Conf]
  17. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06). [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1854- [Conf]
  18. Joerg Abendroth, Christian Damsgaard Jensen
    Partial outsourcing: a new paradigm for access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:134-141 [Conf]
  19. Anthony Harrington, Christian Damsgaard Jensen
    Cryptographic access control in a distributed file system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:158-165 [Conf]
  20. Christian Damsgaard Jensen
    CryptoCache: a secure sharable file cache for roaming users. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:73-78 [Conf]
  21. Christian Damsgaard Jensen, Daniel Hagimont
    Protection wrappers: a simple and portable sandbox for untrusted applications. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:104-110 [Conf]
  22. Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
    End-to-End Trust Starts with Recognition. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:130-142 [Conf]
  23. Elizabeth Gray, Christian Damsgaard Jensen, Paul O'Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen
    Trust Evolution Policies for Security in Collaborative Ad Hoc Applications. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:95-111 [Journal]
  24. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Privacy Recovery with Disposable Email Addresses. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:35-39 [Journal]
  25. Jean-Marc Seigneur, Christian Damsgaard Jensen
    The Claim Tool Kit for ad hoc recognition of peer entities. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:54, n:1, pp:49-71 [Journal]
  26. Stephen Farrell, Christian Damsgaard Jensen
    "End-by-Hop" Data Integrity. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:142-155 [Conf]
  27. Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen
    Program Partitioning Using Dynamic Trust Models. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:170-184 [Conf]
  28. Jean-Marc Seigneur, Gregory Biegel, Christian Damsgaard Jensen
    P2P with JXTA-Java pipes. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2003, pp:207-212 [Conf]

  29. Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. [Citation Graph (, )][DBLP]


  30. Reengineering the Wikipedia for Reputation. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002