|
Search the dblp DataBase
Christian Damsgaard Jensen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christian Damsgaard Jensen, Daniel Hagimont
Protection Reconfiguration for Reusable Software. [Citation Graph (0, 0)][DBLP] CSMR, 1998, pp:74-81 [Conf]
- Benjamin Aziz, Christian Damsgaard Jensen
Adaptability in CORBA: The Mobile Proxy Approach. [Citation Graph (0, 0)][DBLP] DOA, 2000, pp:295-304 [Conf]
- Christian Damsgaard Jensen, George Coulouris, Daniel Hagimont
ECOOP Workshop on Distributed Object Security. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:273-276 [Conf]
- Christian Damsgaard Jensen, Daniel Hagimont
Mutual Suspicion in a Generic Object-Support System. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:278- [Conf]
- Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray
Risk Probability Estimating Based on Clustering. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:229-233 [Conf]
- Christian Damsgaard Jensen
Fingerprinting Text in Logical Markup Languages. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:433-445 [Conf]
- Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. [Citation Graph (0, 0)][DBLP] iTrust, 2005, pp:321-337 [Conf]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
Trading Privacy for Trust. [Citation Graph (0, 0)][DBLP] iTrust, 2004, pp:93-107 [Conf]
- Elizabeth Gray, Jean-Marc Seigneur, Yong Chen, Christian Damsgaard Jensen
Trust Propagation in Small Worlds. [Citation Graph (0, 0)][DBLP] iTrust, 2003, pp:239-254 [Conf]
- Christian Damsgaard Jensen, Paul O'Connell
Trust-Based Route Selection in Dynamic Source Routing. [Citation Graph (0, 0)][DBLP] iTrust, 2006, pp:150-163 [Conf]
- Johan Andersson, Stefan Weber, Christian Damsgaard Jensen, Vinny Cahill
PEM3 - The Policy Enhanced Memory Management Model. [Citation Graph (0, 0)][DBLP] POLICY, 2002, pp:194-197 [Conf]
- Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:89-101 [Conf]
- Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen
Combating Spam with TEA. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:47-58 [Conf]
- Joerg Abendroth, Christian Damsgaard Jensen
A Unified Security Framework for Networked Applications. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:351-357 [Conf]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
Trust enhanced ubiquitous payment without too much privacy loss. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:1593-1599 [Conf]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:1569- [Conf]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06). [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:1854- [Conf]
- Joerg Abendroth, Christian Damsgaard Jensen
Partial outsourcing: a new paradigm for access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:134-141 [Conf]
- Anthony Harrington, Christian Damsgaard Jensen
Cryptographic access control in a distributed file system. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:158-165 [Conf]
- Christian Damsgaard Jensen
CryptoCache: a secure sharable file cache for roaming users. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 2000, pp:73-78 [Conf]
- Christian Damsgaard Jensen, Daniel Hagimont
Protection wrappers: a simple and portable sandbox for untrusted applications. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1998, pp:104-110 [Conf]
- Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
End-to-End Trust Starts with Recognition. [Citation Graph (0, 0)][DBLP] SPC, 2003, pp:130-142 [Conf]
- Elizabeth Gray, Christian Damsgaard Jensen, Paul O'Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:95-111 [Journal]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
Privacy Recovery with Disposable Email Addresses. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:6, pp:35-39 [Journal]
- Jean-Marc Seigneur, Christian Damsgaard Jensen
The Claim Tool Kit for ad hoc recognition of peer entities. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2005, v:54, n:1, pp:49-71 [Journal]
- Stephen Farrell, Christian Damsgaard Jensen
"End-by-Hop" Data Integrity. [Citation Graph (0, 0)][DBLP] ESAS, 2007, pp:142-155 [Conf]
- Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen
Program Partitioning Using Dynamic Trust Models. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2006, pp:170-184 [Conf]
- Jean-Marc Seigneur, Gregory Biegel, Christian Damsgaard Jensen
P2P with JXTA-Java pipes. [Citation Graph (0, 0)][DBLP] PPPJ, 2003, pp:207-212 [Conf]
Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. [Citation Graph (, )][DBLP]
Reengineering the Wikipedia for Reputation. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|