2018 (11)
  1. P. Moriano, R. Hill, and L. J. Camp. Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology. In Conference on Complex Systems, Thessaloniki, Greece, September 2018. [bibtex-entry]


  2. Jacob Abbott, Daniel Calarco, and L. Jean Camp. Factors Influencing Password Reuse: A Case Study. In , 2018. TPRC. [bibtex-entry]


  3. Sanchari Das, Andrew Dingman, and L Jean Camp. Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC), 2018. [bibtex-entry]


  4. Sanchari Das, Andrew Dingman, and L. Jean Camp. Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC), 2018. [bibtex-entry]


  5. Jayati Dev, Sanchari Das, and L. Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, 2018. Lulu. com. [bibtex-entry]


  6. Jayati Dev, Sanchari Das, and L Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM. [bibtex-entry]


  7. Jayati Dev, Sanchari Das, and L. Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM. [bibtex-entry]


  8. Andrew Dingman, Gianpaolo Russo, George Osterholt, Tyler Uffelman, and L. Jean Camp. Good Advice That Just Doesn't Help. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 289--291, 2018. IEEE. [bibtex-entry]


  9. C. McElroy, P. Moriano, and L. J. Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. In Network and Distributed System Security Symposium (NDSS), 2018. [bibtex-entry]


  10. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE. [bibtex-entry]


  11. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L. Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE. [bibtex-entry]


2017 (4)
  1. Sanchari Das, Javon Goard, and Dakota Murray. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society, pages 30, 2017. ACM. [bibtex-entry]


  2. Haley MacLeod, Jacob Abbott, and Sameer Patil. Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases. In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017.
    Keywords: Privacy, Health, Rare Diseases, Anonymized Data. [bibtex-entry]


  3. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017. [bibtex-entry]


  4. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Insider Threat Event Detection in User-System Interactions. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pages 1--12, 2017. ACM. [bibtex-entry]


2016 (10)
  1. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, 2016. ACM. [bibtex-entry]


  2. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, 2016. IEEE. [bibtex-entry]


  3. L Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, 2016. IEEE.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]


  4. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, 2016. IEEE. [bibtex-entry]


  5. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE. [bibtex-entry]


  6. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-entry]


  7. Abhijit Pal, Indrasis Roy, Jayati Dev, Arijit Dey, Soumyo Chatterjee, and Sayan Chatterjee. Closed-form design expression for first null beam width with Taylor distribution. In Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on, pages 837--840, 2016. IEEE.
    Keywords: FNBW Expression, Broadside Antenna Array, Taylor Distribution. [bibtex-entry]


  8. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016. [bibtex-entry]


  9. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]


  10. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016. [bibtex-entry]


2015 (4)
  1. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering IP source spoofing using feasible path reverse path forwarding with SDN. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 733--734, 2015. IEEE. [bibtex-entry]


  2. L. Jean Camp. Security and Privacy Interactions as Risk Communication. In 2015 AAAS Annual Meeting (12-16 February 2015), 2015. aaas. [bibtex-entry]


  3. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Beyond the lock icon: real-time detection of phishing websites using public key certificates. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--12, 2015. IEEE. [bibtex-entry]


  4. Vaibhav Garg and L. Jean Camp. Spare the rod, spoil the network security? Economic analysis of sanctions online. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--10, 2015. IEEE. [bibtex-entry]


2014 (3)
  1. Zheng Dong, Kevin Kane, and L. Jean Camp. Phishing in Smooth Waters: The State of Banking Certificates in the US. In 2014 TPRC Conference Paper, 2014. [bibtex-entry]


  2. Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study. In 2014 Telecommunications Policy Research Conference (TPRC), Arlington VA, 2014. [bibtex-entry]


  3. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC), 2014. [bibtex-entry]


2013 (7)
  1. Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of the third ACM conference on Data and application security and privacy, pages 105--116, 2013. ACM. [bibtex-entry]


  2. Kevin Benton, L. Jean Camp, and Vaibhav Garg. Studying the effectiveness of android application permissions requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291--296, 2013. IEEE. [bibtex-entry]


  3. Kevin Benton, L. Jean Camp, and Chris Small. OpenFlow vulnerability assessment. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 151--152, 2013. ACM. [bibtex-entry]


  4. Ty Bross and L. Jean Camp. I just want your anonymized contacts! benefits and education in security & privacy research. In 2013 IEEE Security and Privacy Workshops, pages 1--6, 2013. IEEE. [bibtex-entry]


  5. L. Jean Camp. Beyond usability: Security interactions as risk perceptions. In Workshop on Risk Perception in IT Security and Privacy, Newcastle, UK. http://citeseerx. ist. psu. edu/viewdoc/download, 2013. [bibtex-entry]


  6. Vaibhav Garg and L. Jean Camp. Ex ante vs. ex post: Economically efficient sanctioning regimes for online risks. In , 2013. TPRC. [bibtex-entry]


  7. Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. Peer-produced privacy protection. In Technology and Society (ISTAS), 2013 IEEE International Symposium on, pages 147--154, 2013. IEEE. [bibtex-entry]


2012 (8)
  1. Jim Blythe and L. Jean Camp. Implementing Mental Models. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 86--90, 2012. IEEE. [bibtex-entry]


  2. Zheng Dong and L. Jean Camp. Peersec: Towards peer production and crowdsourcing for enhanced security. In The 7th USENIX Workshop on Hot Topics in Security (HotSec), 2012. [bibtex-entry]


  3. Zheng Dong, Vaibhav Garg, L. Jean Camp, and Apu Kapadia. Pools, clubs and security: designing for a party not a person. In Proceedings of the 2012 New Security Paradigms Workshop, pages 77--86, 2012. ACM. [bibtex-entry]


  4. John F Duncan and L. Jean Camp. Conducting an Ethical Study of Web Traffic.. In CSET, 2012. [bibtex-entry]


  5. Vaibhav Garg, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. Risk communication design: video vs. text. In International Symposium on Privacy Enhancing Technologies Symposium, pages 279--298, 2012. Springer Berlin Heidelberg. [bibtex-entry]


  6. Vaibhav Garg and L. Jean Camp. End user perception of online risk under uncertainty. In System Science (HICSS), 2012 45th Hawaii International Conference on, pages 3278--3287, 2012. IEEE. [bibtex-entry]


  7. Timothy Kelley, L. Jean Camp, Suzanne Lien, and Douglas Stebila. Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences. In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, pages 47--54, 2012. ACM. [bibtex-entry]


  8. Greg Norcie, Kelly Caine, and L. Jean Camp. Eliminating Stop-Points in the Installation and Use of Anonymity Systems: a Usability Evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012. [bibtex-entry]


2011 (3)
  1. Jim Blythe, L. Jean Camp, and Vaibhav Garg. Targeted risk communication for computer security. In Proceedings of the 16th international conference on Intelligent user interfaces, pages 295--298, 2011. ACM. [bibtex-entry]


  2. Vaibhav Garg, Nathaniel Husted, and L. Jean Camp. The smuggling theory approach to organized digital crime. In eCrime Researchers Summit (eCrime), 2011, pages 1--7, 2011. IEEE. [bibtex-entry]


  3. L Lorenzen Huber, L Borrero, B Walker, K Shankar, K Caine, K Connelly, and J Camp. HOW OLDER ADULTS USE INFORMATION TECHNOLOGY TO REDUCE CAREGIVER BURDEN. In GERONTOLOGIST, volume 51, pages 18--18, 2011. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]


2010 (8)
  1. Kelly E Caine, Celine Y Zimmerman, Zachary Schall-Zimmerman, William R Hazlewood, Alexander C Sulgrove, L. Jean Camp, Katherine H Connelly, Lesa L Huber, and Kalpana Shankar. DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 153--162, 2010. ACM. [bibtex-entry]


  2. J Camp, L Lorenzen Huber, and L Borrero. WHAT DO OLDER ADULTS UNDERSTAND ABOUT THEIR PRIVACY RISKS WHILE ONLINE?. In GERONTOLOGIST, volume 50, pages 490--490, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]


  3. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Managing the last eights: three ways forward for IPv6. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pages 53--60, 2010. ACM. [bibtex-entry]


  4. Zheng Dong and L. Jean Camp. Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pages 43--51, 2010. ACM. [bibtex-entry]


  5. V Gargv and J Camp. How Safe is Safe Enough: Online Version. In Workshop on Security and Human Behavior, 2010. [bibtex-entry]


  6. L Lorenzen Huber, J Camp, K Connelly, K Shankar, K Caine, W Hazlewood, and Z Zimmerman. A PRIVACY FRAMEWORK FOR EVALUATING IN-HOME TECHNOLOGIES. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]


  7. Azadeh Nematzadeh and L. Jean Camp. Threat analysis of online health information system. In Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, pages 31, 2010. ACM. [bibtex-entry]


  8. B Walker, L Lorenzen Huber, and J Camp. DO THE COSTS OUTWEIGH THE BENEFITS? USING A RESOURCE-ORIENTED PERSPECTIVE TO EVALUATE MOBILE PHONE APPS. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]


2009 (3)
  1. L Camp. Hardening the Network from the Friend Within. In Information Security and Privacy, pages 249--249, 2009. Springer. [bibtex-entry]


  2. L. Jean Camp. Design for trust in ambient and ubiquitous computing. In International Conference on Autonomic and Trusted Computing, pages 1--1, 2009. Springer Berlin Heidelberg. [bibtex-entry]


  3. John Duncan, L. Jean Camp, and William R Hazelwood. The portal monitor: a privacy-enhanced event-driven system for elder care. In Proceedings of the 4th International Conference on Persuasive Technology, pages 36, 2009. ACM. [bibtex-entry]


2008 (1)
  1. Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the United States.. In WEIS, 2008. [bibtex-entry]


2007 (1)
  1. Preeti Hariharan, Farzaneh Asgharpour, and L. Jean Camp. Nettrust—recommendation system for embedding trust in a virtual realm. In Proceedings of the ACM Conference on Recommender Systems, 2007. Citeseer. [bibtex-entry]


2006 (6)
  1. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. The Introduction of the OSCAR Database API (ODA). In Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06), pages 39, May # 14-17 2006. IEEE Computer Society.
    Note: Session track: 4th Annual OSCAR Symposium (OSCAR'06).
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]


  2. Ross Anderson, Alessandro Acquisti, L. Jean Camp, Larry Gordon, Marty Loeb, Andrew Odlyzko, Stuart Schechter, Bruce Schneier, and Rahul Telang. The Fifth Workshop on the Economics of Information Security (WEIS 2006). In Workshop: June, volume 26, pages 28, 2006. [bibtex-entry]


  3. L JEAN CAMP. 1. TRANSPARENCY IN COMPUTER CODE. In Proceedings of the British Academy, volume 135, pages 183--195, 2006. [bibtex-entry]


  4. L. Jean Camp, Kay Connelly, and Lesa Lorenzen-Huber. Beyond Consent: Implications of Ubicomp for Privacy. In Telecommunications Policy Research Conference, 2006. [bibtex-entry]


  5. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and morality: A tale of user deceit. In Models of Trust for the Web (MTW’06), Edinburgh, Scotland, volume 22, 2006. World Wide Web Conference. [bibtex-entry]


  6. Debin Liu and L. Jean Camp. Proof of work can work. In Fifth Workshop on the Economics of Information Security, 2006. [bibtex-entry]


2005 (3)
  1. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. Revamping the OSCAR database: A Flexible Approach to Cluster Configuration Data Management. In Ilias Kotsireas and Deborah Stacey, editors, 19th International Symposium on High Performance Computing Systems and Applications, Guelph, Ontario, Canada, pages 326-332, May 2005. IEEE Computer Society.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]


  2. L. Jean Camp, Warigia Bowman, and Allan Friedman. Voting, vote capture & vote counting symposium. In Proceedings of the 2005 national conference on Digital government research, pages 198--199, 2005. Digital Government Society of North America. [bibtex-entry]


  3. L. Jean Camp, Kay Connelly, and Kalpana Shankar. Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design. In Proceedings of ETHICOMP, pages 12--14, 2005. [bibtex-entry]


2004 (4)
  1. L. Jean Camp and Allan Friedman. Peer Patching--Rapid Response in Distributed Systems. In 24th Army Science Conference, 2004. [bibtex-entry]


  2. L. Jean Camp and Allan Friedman. Good neighbors can make good fences: A peer-to-peer user security system. In Telecommunications Policy and Research Conference, 2004. [bibtex-entry]


  3. L. Jean Camp. Mental models of computer security. In Financial Cryptography, pages 106--111, 2004. Springer Berlin Heidelberg. [bibtex-entry]


  4. L. Jean Camp. Identity the civic scenario. In Proceedings of the 2004 annual national conference on Digital government research, pages 61, 2004. Digital Government Society of North America. [bibtex-entry]


2003 (4)
  1. L. Jean Camp. Identity, authentication, and identifiers in digital government. In Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on, pages 10--13, 2003. IEEE. [bibtex-entry]


  2. L. Jean Camp. Open code for digital government. In Proceedings of the 2003 annual national conference on Digital government research, pages 1--2, 2003. Digital Government Society of North America. [bibtex-entry]


  3. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC. [bibtex-entry]


  4. Rebecca N Wright, L. Jean Camp, Ian Goldberg, Ronald L Rivest, and Graham Wood. Privacy tradeoffs: myth or reality?. In Financial Cryptography, pages 147--151, 2003. Springer Berlin Heidelberg. [bibtex-entry]


2002 (2)
  1. L. Jean Camp. Marketplace incentives to prevent piracy: an incentive for security?. In Presentation at Workshop on Information Security Economics, UC-Berkeley, 2002. [bibtex-entry]


  2. L. Jean Camp. DRM: doesn't really mean digital copyright management. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 78--87, 2002. ACM. [bibtex-entry]


2001 (2)
  1. L. Jean Camp and Carolyn Gideon. Limits To Certainty in QoS Pricing and Bandwidth. In w: Proc. of the 29th Research Conference on Communication, Information and Internet Policy, 2001. [bibtex-entry]


  2. L. Jean Camp, Helen Nissenbaum, and Cathleen McGrath. Trust: A collision of paradigms. In International Conference on Financial Cryptography, pages 91--105, 2001. Springer Berlin Heidelberg. [bibtex-entry]


2000 (3)
  1. L. Jean Camp and C Gideon. Certainty in bandwidth or price. In Proceeding of the 29th Research Conference on Communication, Information and Internet Policy, Washington, DC, 2000. [bibtex-entry]


  2. L. Jean Camp and Catherine Wolfram. Pricing security. In Proceedings of the CERT Information Survivability Workshop, pages 31--39, 2000. [bibtex-entry]


  3. L. Jean Camp. Computer security when data= life. In Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, pages 3--3, 2000. IEEE. [bibtex-entry]


1997 (3)
  1. L. Jean Camp and Donna M Riley. Bedrooms, Barrooms, and Boardrooms on the Interner. In Interconnection and the Internet: selected papers from the 1996 Telecommunications Policy Research Conference, pages 205, 1997. Lawrence Erlbaum. [bibtex-entry]


  2. L. Jean Camp. Opportunities, Options, Obstacles for Payment in Internet Commerce. In EDI FORUM-OAK PARK-, volume 10, pages 19--32, 1997. THE EDI GROUP, LTD.. [bibtex-entry]


  3. David A Evensky, Ann C Gentile, L. Jean Camp, and Robert C Armstrong. Lilith: Scalable execution of user code for distributed computing. In High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on, pages 305--314, 1997. IEEE. [bibtex-entry]


1996 (1)
  1. L. Jean Camp and Donna M Riley. Bedrooms. Barrooms. and Boardrooms 0n the Internetl]:|. In Interconnection and the Internet: Selected Papers From the 1996 Telecommunications Policy Research Conference, pages 205, 1996. Routledge. [bibtex-entry]


1995 (3)
  1. L. Jean Camp and D Riley. Women, children, animals and the like: Protecting an unwilling electronic populace. In Proceedings of the Fifth Conference on Computers, Freedom and Privacy, pages 120--139, 1995. [bibtex-entry]


  2. L. Jean Camp, Marvin A Sirbu, and J Doug Tygar. Token and Notational Money in Electronic Commerce.. In Usenix Workshop on Electronic Commerce, 1995. [bibtex-entry]


  3. L. Jean Camp, Marvin Sirbu, and JD Tygar. Token and notational money in electronic commerce. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 1--12, 1995. [bibtex-entry]


1993 (1)
  1. L. Jean Camp and Marvin Sirbu. Networking strategy at traveler's insurance. In Proceedings of the 1993 conference on Computer personnel research, pages 450--462, 1993. ACM. [bibtex-entry]


no valid year (3)
  1. Jacob Abbott, Daniel Calarco, and L Jean Camp. Factors Influencing Password Reuse: A Case Study. In TPRC46: Research Conference on Communications, Information and Internet Policy year=2018, September. TPRC.
    Keywords: Passwords, Policies, Requirements, Reuse. [bibtex-entry]


  2. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, . Lulu. com. [bibtex-entry]


  3. Vaibhav Garg and L. Jean Camp. Macroeconomic Analysis of Malware. In Network and Distributed System Security Symposium Extended Abstracts, . [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Jan 22 00:00:03 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html