[ Publications of year 2003 ]

Articles in journals or book chapters (6)
  1. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security.
    @Article{ camphuman,
    title = {Human Implications of Technology},
    url = {http://www.ljean.com/files/CampYeeHandbook.pdf},
    journal = {Practical Handbook of Internet Computing, ed. M. P. Singh},
    note = {CRC Press},
    keywords = "Human-Centered Security",
    author = {Camp, L. Jean and Yee, Ka-Ping},
    month = {December},
    year = {2003} }

  2. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: SDN.
    @Article{ camp2003designing,
    title = {Designing for trust},
    author = {Camp, L. Jean},
    journal = {Trust, Reputation, and Security: Theories and Practice},
    pages = {203--209},
    year = {2003},
    keywords = "SDN",
    note = {Springer} }

  3. L. Jean Camp. First principles of copyright for DRM design. IEEE Internet Computing, 7(3):59--65, 2003.
    Note: IEEE.
    @Article{ camp2003first,
    title = {First principles of copyright for DRM design},
    author = {Camp, L. Jean},
    journal = {IEEE Internet Computing},
    volume = {7},
    number = {3},
    pages = {59--65},
    year = {2003},
    note = {IEEE} }

  4. L. Jean Camp. Code, coding and coded perspectives. Journal of Information, Communication and Ethics in Society, 1(1):49--60, 2003.
    Keywords: Internet Governance.
    @Article{ camp2003code,
    title = {Code, coding and coded perspectives},
    url = {http://www.ljean.com/files/aoir/aoir.html},
    author = {Camp, L. Jean},
    journal = {Journal of Information, Communication and Ethics in Society},
    volume = {1},
    number = {1},
    pages = {49--60},
    year = {2003},
    keywords = {Internet Governance},
    publisher = {MCB UP Ltd} }

  5. L. Jean Camp and Carlos A Osorio. Privacy-enhancing technologies for internet commerce. Trust in the Network Economy, pp 317--331, 2003.
    Note: Springer.
    Keywords: Privacy.
    @Article{ camp2003privacy,
    title = {Privacy-enhancing technologies for internet commerce},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=329282},
    author = {Camp, L. Jean and Osorio, Carlos A},
    journal = {Trust in the Network Economy},
    pages = {317--331},
    year = {2003},
    keywords = "Privacy",
    note = {Springer} }

  6. L. Jean Camp. Peer-to-Peer Systems. The Internet Encyclopedia, 2003.
    Note: Wiley Online Library.
    Keywords: Design for Trust.
    @Article{ camp2003peer,
    title = {Peer-to-Peer Systems},
    url = {http://www.ljean.com/files/P2P.pdf},
    author = {Camp, L. Jean},
    journal = {The Internet Encyclopedia},
    year = {2003},
    keywords = "Design for Trust",
    note = {Wiley Online Library} }

Conference publications (4)
  1. L. Jean Camp. Open code for digital government. In Proceedings of the 2003 annual national conference on Digital government research, pages 1--2, 2003. Digital Government Society of North America.
    @InProceedings{ camp2003open,
    title = {Open code for digital government},
    author = {Camp, L. Jean},
    booktitle = {Proceedings of the 2003 annual national conference on Digital government research},
    pages = {1--2},
    year = {2003},
    organization = {Digital Government Society of North America} }

  2. L. Jean Camp. Identity, authentication, and identifiers in digital government. In Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on, pages 10--13, 2003. IEEE.
    @InProceedings{ camp2003identity,
    title = {Identity, authentication, and identifiers in digital government},
    author = {Camp, L. Jean},
    booktitle = {Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on},
    pages = {10--13},
    year = {2003},
    organization = {IEEE} }

  3. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Information Security.
    @InProceedings{ friedman2003making,
    title = {Making Security Manifest Security and Autonomy for End Users},
    url = {http://www.ljean.com/files/Manifest.pdf},
    author = {Friedman, Allan and Camp, L. Jean},
    keywords = "Mental Models, Human-Centered Security, Economics of Information Security",
    year = {2003},
    organization = {TPRC} }

  4. Rebecca N Wright, L. Jean Camp, Ian Goldberg, Ronald L Rivest, and Graham Wood. Privacy tradeoffs: myth or reality?. In Financial Cryptography, pages 147--151, 2003. Springer Berlin Heidelberg.
    @InProceedings{ wright2003privacy,
    title = {Privacy tradeoffs: myth or reality?},
    author = {Wright, Rebecca N and Camp, L. Jean and Goldberg, Ian and Rivest, Ronald L and Wood, Graham},
    booktitle = {Financial Cryptography},
    pages = {147--151},
    year = {2003},
    organization = {Springer Berlin Heidelberg} }

Posters and Presentations (1)
  1. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone. Springer-Verlang (Berlin), 2003.
    Keywords: Design for Trust.
    @Misc{ camp2003design,
    title = {Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=627610},
    author = {Camp, L. Jean},
    year = {2003},
    keywords = "Design for Trust",
    howpublished = {Springer-Verlang (Berlin)} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Oct 22 15:55:32 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House