[ Publications of year 2014 ]

Articles in journals or book chapters (6)
  1. Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W Moore, L. Jean Camp, Kevin Benton, and Ross Anderson. Collaborating with the enemy on network management. In Security Protocols XXII, pages 154--162. Springer International Publishing, 2014.
    Keywords: Network Engineering. [bibtex-entry]

  2. Terry Davis, Jon M Peha, Eric Burger, L. Jean Camp, and Dan Lubar. Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity. Available at SSRN 2468604, 2014. [bibtex-entry]

  3. Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, and Kay Connelly. Privacy concerns in assisted living technologies. annals of telecommunications-annales des t?l?communications, 69(1-2):75--88, 2014.
    Keywords: Aging. [bibtex-entry]

  4. Hilda Hadan. On the Application of Two-Dimensional Code in Television Production and Broadcasting. International Broadband Network, 2014. [bibtex-entry]

  5. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth. Mobile Networks and Applications (MONET), 19(3), 2014. [bibtex-entry]

  6. Martina Angela Sasse, Charles C Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, and L. Jean Camp. Helping you protect you. IEEE Security & Privacy, 12(1):39--42, 2014. [bibtex-entry]

Conference publications (4)
  1. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication. In Proceedings of the IEEE Symposium on Security and Privacy (S{\& }P), May 2014.
    Note: The project has been renamed SAW.
    Keywords: referred. [bibtex-entry]

  2. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC), February 2014.
    Keywords: Human-Centered Security. [bibtex-entry]

  3. Berkay Aydin, Dustin Kempton, Vijay Akkineni, Shakthidhar Reddy Gopavaram, Karthik Ganesan Pillai, and Rafal Angryk. Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns. In 2014 IEEE international conference on big data (Big Data), pages 1--10, 2014. IEEE. [bibtex-entry]

  4. Zheng Dong, Kevin Kane, and L. Jean Camp. Phishing in Smooth Waters: The State of Banking Certificates in the US. In 2014 TPRC Conference Paper, 2014.
    Keywords: Phishing, E-Crime. [bibtex-entry]

Internal reports (3)
  1. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report). Technical report TR2014-748, Dartmouth Computer Science, May 2014.
    Note: This project has been renamed SAW.
    Keywords: techreport. [bibtex-entry]

  2. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Vocal resonance as a biometric for pervasive wearable devices. Technical report TR2014-747, Dartmouth Computer Science, February 2014.
    Keywords: authentication, ists, project-tish, security, sensors, wearable. [bibtex-entry]

  3. L. Jean Camp, Ross Anderson, Zhi-Lang Zhang, Chris Hall, Chris Small, Tim Kelley, and others. Hardening Software Defined Networks. Technical report, INDIANA UNIV AT BLOOMINGTON, 2014. [bibtex-entry]

Posters and Presentations (2)
  1. Jacob Abbott, Violeta Moreno, and L. Jean Camp. Password Differences based on Language and Testing of Memory Recall. Annual Computer Security Applications Conference, (New Oleans, LA), December 2014.
    Keywords: Human-Centered Security. [bibtex-entry]

  2. Mart?n Abadi, Hal Abelson, Alessandro Acquisti, Mihir Bellare, Steven Bellovin, Matt Blaze, L. Jean Camp, and Ran Canetti. An open letter from US researchers in cryptography and information security, 2014. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Fri Sep 25 01:00:03 2020
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House