2018 (2)
  1. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-entry]


  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-entry]


2014 (1)
  1. Mart?n Abadi, Hal Abelson, Alessandro Acquisti, Mihir Bellare, Steven Bellovin, Matt Blaze, L. Jean Camp, and Ran Canetti. An open letter from US researchers in cryptography and information security, 2014. [bibtex-entry]


2012 (5)
  1. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers, 2012. [bibtex-entry]


  2. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft, 2012. [bibtex-entry]


  3. L. Jean Camp and M Eric Johnson. The economics of financial and medical identity theft, 2012. [bibtex-entry]


  4. Stef An K Atzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing, 2012. [bibtex-entry]


  5. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings, 2012. [bibtex-entry]


2011 (1)
  1. L. Jean Camp, Kurt Weisman, and Shaun McDermott. Medication Administration And Patient Health Management Strategies, And Systems For Same, Mar # 30 2011.
    Note: US Patent App. 13/075,546. [bibtex-entry]


2010 (1)
  1. L CAMP, John DUNCAN, and others. PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES, Jan # 22 2010.
    Note: WO Patent 2,010,009,361. [bibtex-entry]


2009 (2)
  1. L. Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. Data for cybersecurity research: Process and wish list, 2009. [bibtex-entry]


  2. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4, 2009. [bibtex-entry]


2008 (1)
  1. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, 2008. [bibtex-entry]


2007 (2)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Supuer Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]


  2. L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures, 2007. [bibtex-entry]


2004 (3)
  1. J Camp. Digital rights management-Response, 2004. [bibtex-entry]


  2. L. Jean Camp and Stephen Lewis. Economics of information security, 2004. [bibtex-entry]


  3. L. Jean Camp and Stephen Lewis. Economics of information security, 2004. [bibtex-entry]


2003 (2)
  1. L. Jean Camp. Identity in Digital Government: A report of the 2003 Civic Scenario Workshop, 2003. [bibtex-entry]


  2. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone, 2003. [bibtex-entry]


2001 (1)
  1. Linda J Camp and Marvin Sirbu. Method for certifying delivery of secure electronic transactions, Nov # 13 2001.
    Note: US Patent 6,317,729. [bibtex-entry]


2000 (1)
  1. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, Jun # 13 2000.
    Note: US Patent 6,076,078. [bibtex-entry]


1996 (1)
  1. JD Tygar, Bennet Yee, L. Jean Camp, and Michael Harkavy. Anonymous Atomic Transactions, 1996. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Jan 21 23:00:02 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html