[ Posters and Presentations ]

2022 (1)
  1. Joshua Streiff, Tatiana Ringenberg, Jayati Dev, and L.Jean Camp. Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups. ECGBL, October 2022.
    Keywords: IoT. [bibtex-entry]

2021 (7)
  1. Laura Calloway, Lesa Huber, and L. Jean Camp. Privacy and Usability in COVID Enrollment Apps. Poster at GSA Annual Meeting (Gerontological Society of America, 2021), ONLINE, November 2021.
    Keywords: privacy, health. [bibtex-entry]

  2. Laura Calloway. Harm Reduction for Internet of Things Devices. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual, October 2021.
    Keywords: privacy, health, IoT, surveillance. [bibtex-entry]

  3. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2021.
    Keywords: K12. [bibtex-entry]

  4. L. Jean Camp Ashley Bochner, Jacob Abbott. Potential Reuse of University Credentials. Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.
    Keywords: Passwords, Security, Authentication. [bibtex-entry]

  5. Corey Allen and Joshua Streiff. Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments. IU GROUPS STEM Poster (IN), July 2021.
    Keywords: IoT. [bibtex-entry]

  6. Joshua Streiff. Finding Alice & Bob: Using BLE to Locate Victims & First Responders in Buildings. IU IDER Poster (IN), July 2021.
    Keywords: IoT. [bibtex-entry]

  7. Joshua Streiff. Online Safety For All Ages. Life Lessons 4H Series for High School Students Workshop, June 2021.
    Keywords: K12. [bibtex-entry]

2020 (2)
  1. Andy Puga and Joshua Streiff. Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]

  2. Lizbeth Roque, Emily Sung, and Joshua Streiff. Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]

2019 (12)
  1. Laura Calloway. Corporate Infrastructural Expansion as Big Data Surveillance. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2019), New Orleans, Louisiana, September 2019.
    Keywords: privacy, policies, governance, surveillance. [bibtex-entry]

  2. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Securtle: The Security Turtle. A Bsides STL Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  3. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2019.
    Keywords: K12. [bibtex-entry]

  4. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys. A Bsides MSP Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  5. Joshua Streiff. Educational Hacking Using Command Line & Bluetooth Low Energy. An Avon STEM Educator Leadership Day Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  6. Joshua Streiff. Bears, Unicorns, & Crockpots, Oh My! An Introduction to Internet of Things (IoT) Threat Modeling Education. An AI & Connected Conference Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  7. Joshua Streiff. Practical Cybersecurity and Manipulative Gaming Education. A Flipping the Switch! Cybersecurity Workshop Session at Indiana Department of Education Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  8. Niang Chin, Joshua Streiff, and Sameer Patil. The Overly Friendly Crockpot. Trusted CI Poster Session (IL), July 2019.
    Keywords: IoT. [bibtex-entry]

  9. Nathaly Reynaga, Behnod Momensadeh, Joshua Streiff, and Sameer Patil. The One Where Patty Trusted Her Printer: The Threat of IoT Printers. IU GROUPS STEM Poster (IN), July 2019.
    Keywords: IoT. [bibtex-entry]

  10. Joshua Streiff. Capturing Education: CTF and IoT in K-12 Education. A Luddy Hall Pathfinders Workshop, July 2019.
    Keywords: IoT. [bibtex-entry]

  11. Jeremy Gummeson, Mary Baker, Animesh Srivastava, and Shrirang Mare. Controlling devices based on collocation of the devices on a user. U.S. Patent 10,331,916, June 2019.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]

  12. DongInn Kim and L Jean Camp. Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge. Society for Risk Analysis, SRA 2019, Buffalo NY, June 2019.
    Keywords: Phishing. [bibtex-entry]

2018 (6)
  1. Joshua Streiff. How Santa knows if you are Naughty or Nice: How your IoT toys can spy on you. A SPICE Colloquium Speaker Series, September 2018.
    Keywords: IoT. [bibtex-entry]

  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-entry]

  3. Andr?s D. Molina-Markham, Shrirang Mare, Ronald Peterson, Jr., and David Kotz. Continuous seamless mobile device authentication using a separate electronic wearable apparatus. U.S. Patent 9,961,547, May 2018.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]

  4. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-entry]

  5. David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andr?s Molina-Markham. Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric. U.S. Patent 9,936,877; International Patent Application WO2013096954A1, April 2018.
    Keywords: ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable. [bibtex-entry]

  6. Jonathan Schubauer, David Argast, and L. Jean Camp. Lessig was Right: Influences on Android Permissions. United States Federal Trade Commission PrivacyCon Conference, February 2018.
    Keywords: Mobile Privacy, Governance. [bibtex-entry]

2017 (1)
  1. Shrirang Mare, Andr?s Molina-Markham, Ronald Peterson, and David Kotz. System, method and authorization device for biometric access control to digital devices. U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 2017.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]

2015 (1)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering. [bibtex-entry]

2014 (2)
  1. Jacob Abbott, Violeta Moreno, and L. Jean Camp. Password Differences based on Language and Testing of Memory Recall. Annual Computer Security Applications Conference, (New Oleans, LA), December 2014.
    Keywords: Passwords, Usability, User Study. [bibtex-entry]

  2. Mart?n Abadi, Hal Abelson, Alessandro Acquisti, Mihir Bellare, Steven Bellovin, Matt Blaze, L. Jean Camp, and Ran Canetti. An open letter from US researchers in cryptography and information security, 2014. [bibtex-entry]

2013 (1)
  1. L. Jean Camp. Translucent Security: Security Interactions as Risk Perceptions. A SOUPS Workshop, July 2013.
    Keywords: Mental Models. [bibtex-entry]

2012 (3)
  1. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Springer, 2012. [bibtex-entry]

  2. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2012. [bibtex-entry]

  3. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Springer, 2012. [bibtex-entry]

2011 (1)
  1. L. Jean Camp, Kurt Weisman, and Shaun McDermott. Medication Administration And Patient Health Management Strategies, And Systems For Same, Mar # 30 2011.
    Note: US Patent App. 13/075,546. [bibtex-entry]

2010 (1)
  1. L CAMP, John DUNCAN, and others. PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES, Jan # 22 2010.
    Note: WO Patent 2,010,009,361. [bibtex-entry]

2009 (2)
  1. L. Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. Data for cybersecurity research: Process and wish list. Academic Press, 2009. [bibtex-entry]

  2. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4. ARIN, 2009.
    Keywords: Network Engineering. [bibtex-entry]

2008 (1)
  1. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, July 2008. [bibtex-entry]

2007 (2)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Super Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]

  2. L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures. Springer, 2007. [bibtex-entry]

2004 (1)
  1. L. Jean Camp and Stephen Lewis. Economics of information security. Springer Science & Business Media, 2004. [bibtex-entry]

2003 (1)
  1. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone. Springer-Verlang (Berlin), 2003.
    Keywords: Design for Trust. [bibtex-entry]

2001 (1)
  1. L. Jean Camp and Marvin Sirbu. Method for certifying delivery of secure electronic transactions, 1) 2001.
    Note: US Patent 6,317,729.
    Keywords: Network Engineering. [bibtex-entry]

2000 (1)
  1. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, June 2000.
    Note: US Patent 6,076,078.
    Keywords: Economics of Security, Network Engineering. [bibtex-entry]

1997 (1)
  1. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering. [bibtex-entry]

1996 (1)
  1. JD Tygar, Bennet Yee, L. Jean Camp, and Michael Harkavy. Anonymous Atomic Transactions. CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE, 1996. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:16 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House