[ Posters and Presentations ]

2018 (3)
  1. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-entry]

  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-entry]

  3. Jonathan Schubauer, David Argast, and L. Jean Camp. Lessig was Right: Influences on Android Permissions. United States Federal Trade Commission PrivacyCon Conference, February 2018.
    Keywords: Security, Permission, Authentication, IT Governance. [bibtex-entry]

2015 (1)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering. [bibtex-entry]

2014 (2)
  1. Jacob Abbott, Violeta Moreno, and L. Jean Camp. Password Differences based on Language and Testing of Memory Recall. Annual Computer Security Applications Conference, (New Oleans, LA), December 2014.
    Keywords: Human-Centered Security. [bibtex-entry]

  2. Mart?n Abadi, Hal Abelson, Alessandro Acquisti, Mihir Bellare, Steven Bellovin, Matt Blaze, L. Jean Camp, and Ran Canetti. An open letter from US researchers in cryptography and information security, 2014. [bibtex-entry]

2013 (1)
  1. L. Jean Camp. Translucent Security: Security Interactions as Risk Perceptions. A SOUPS Workshop, July 2013.
    Keywords: Mental Models. [bibtex-entry]

2012 (3)
  1. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Springer, 2012. [bibtex-entry]

  2. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2012. [bibtex-entry]

  3. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Springer, 2012. [bibtex-entry]

2011 (1)
  1. L. Jean Camp, Kurt Weisman, and Shaun McDermott. Medication Administration And Patient Health Management Strategies, And Systems For Same, Mar # 30 2011.
    Note: US Patent App. 13/075,546. [bibtex-entry]

2010 (1)
    Note: WO Patent 2,010,009,361. [bibtex-entry]

2009 (2)
  1. L. Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. Data for cybersecurity research: Process and wish list. Academic Press, 2009. [bibtex-entry]

  2. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4. ARIN, 2009.
    Keywords: Network Engineering. [bibtex-entry]

2008 (1)
  1. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, July 2008. [bibtex-entry]

2007 (2)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Supuer Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]

  2. L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures. Springer, 2007. [bibtex-entry]

2004 (1)
  1. L. Jean Camp and Stephen Lewis. Economics of information security. Springer Science & Business Media, 2004. [bibtex-entry]

2003 (1)
  1. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone. Springer-Verlang (Berlin), 2003.
    Keywords: Design for Trust. [bibtex-entry]

2001 (1)
  1. L. Jean Camp and Marvin Sirbu. Method for certifying delivery of secure electronic transactions, Nov # 13 2001.
    Note: US Patent 6,317,729. [bibtex-entry]

2000 (1)
  1. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, June 2000.
    Note: US Patent 6,076,078. [bibtex-entry]

1997 (1)
  1. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering. [bibtex-entry]

1996 (1)
  1. JD Tygar, Bennet Yee, L. Jean Camp, and Michael Harkavy. Anonymous Atomic Transactions. CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE, 1996. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Thu Aug 22 01:00:06 2019
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House