Articles in journals or book chapters (8)
  1. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy, pages 332--348. Auerbach Publications, 2007. [bibtex-entry]

  2. Sabrina De Capitani di Vimercati, Stefanos Gritzalis, Costas Lambrinoudakis, Alessandro Acquisti, L. Jean Camp, and Kay Connelly. Beyond Consent. In Digital Privacy: Theory, Technologies, and Practices, pages 327--343. Auerbach Publications, 2007. [bibtex-entry]

  3. Farzaneh Asgharpour, Debin Liu, and L Camp. Mental models of security risks. Financial Cryptography and Data Security, pp 367--377, 2007. [bibtex-entry]

  4. L. Jean Camp. Reliable, Usable Signaling to Defeat Masquerade Attacks. ISJLP, 3:211, 2007. [bibtex-entry]

  5. L. Jean Camp, Farzaneh Asgharpour, Debin Liu, and IN Bloomington. Experimental evaluations of expert and non-expert computer users’ mental models of security risks. Proceedings of WEIS 2007, 2007. [bibtex-entry]

  6. L JEAN Camp. Security and Usability [Guest Editor's Introduction]. Technology and Society Magazine, IEEE, 26(1):3--24, 2007. [bibtex-entry]

  7. Alla Genkina and L. Jean Camp. Social networks. Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons, pp 523--550, 2007. [bibtex-entry]

  8. Alex Tsow, Camilo Viecco, and L. Jean Camp. Privacy-aware architecture for sharing web histories. IBM Systems Journal, 3:5--13, 2007. [bibtex-entry]

Conference articles (1)
  1. Preeti Hariharan, Farzaneh Asgharpour, and L. Jean Camp. Nettrust—recommendation system for embedding trust in a virtual realm. In Proceedings of the ACM Conference on Recommender Systems, 2007. Citeseer. [bibtex-entry]

Posters and Presentations (2)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Supuer Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]

  2. L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures, 2007. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Sat Feb 16 05:00:03 2019
Author: teamhats.

This document was translated from BibTEX by bibtex2html