[ Publications of year 2000 ]

Books and proceedings (1)
  1. L. Jean Camp. Trust & Risk in Internet Commerce. MIT Press, December 2000.
    Keywords: Design for Trust. [bibtex-entry]

Articles in journals or book chapters (5)
  1. L. Jean Camp. The Post-Convergence Consumer. In Creative Destruction, pages 213--228. MIT Press, 2000.
    Keywords: Internet Governance. [bibtex-entry]

  2. L. Jean Camp and YT Chien. The internet as public space: concepts, issues, and implications in public policy. ACM SIGCAS Computers and Society, 30(3):13--19, 2000. [bibtex-entry]

  3. L. Jean Camp and Rose P Tsang. Universal service in a ubiquitous digital network. Ethics and Information Technology, 2(4):211--221, 2000.
    Keywords: Network Engineering. [bibtex-entry]

  4. L. Jean Camp. The world in 2010: many new entrants. info, 2(2):167--185, 2000.
    Note: MCB UP Ltd. [bibtex-entry]

  5. Alan McAdams, L. Jean Camp, and Shastri Divakaruni. The evolution of US telecommunications infrastructure. info, 2(2):107--110, 2000.
    Note: MCB UP Ltd. [bibtex-entry]

Conference publications (3)
  1. L. Jean Camp. Computer security when data= life. In Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, pages 3--3, 2000. IEEE. [bibtex-entry]

  2. L. Jean Camp and C Gideon. Certainty in bandwidth or price. In Proceeding of the 29th Research Conference on Communication, Information and Internet Policy, Washington, DC, 2000. [bibtex-entry]

  3. L. Jean Camp and Catherine Wolfram. Pricing security. In Proceedings of the CERT Information Survivability Workshop, pages 31--39, 2000. [bibtex-entry]

Posters and Presentations (1)
  1. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, June 2000.
    Note: US Patent 6,076,078. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Tue Jul 14 01:00:04 2020
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House