[ Publications of year 2012 ]

Articles in journals or book chapters (14)
  1. Alessandro Armando, Hilarie Orman, Terry Benzel, L. Jean Camp, Bruno Crispo, Grit Denker, Eduard Hovy, Alefiya Hussain, Daniela Oliveira, and Pierangela Samarati. WSCS 2012. 2012.
    @Article{ armando2012wscs,
    title = {WSCS 2012},
    author = {Armando, Alessandro and Orman, Hilarie and Benzel, Terry and Camp, L. Jean and Crispo, Bruno and Denker, Grit and Hovy, Eduard and Hussain, Alefiya and Oliveira, Daniela and Samarati, Pierangela},
    year = {2012} }

  2. Jim Blyth, Sven Dietrich, and L. Jean Camp. Proceedings of the 16th international conference on Financial Cryptography and Data Security. Springer-Verlag, 2012.
    @Article{ blyth2012proceedings,
    title = {Proceedings of the 16th international conference on Financial Cryptography and Data Security},
    author = {Blyth, Jim and Dietrich, Sven and Camp, L. Jean},
    year = {2012},
    journal = {Springer-Verlag} }

  3. L. Jean Camp and M Eric Johnson. Identity Theft. The Economics of Financial and Medical Identity Theft, pp 17--30, 2012.
    Note: Springer US.
    @Article{ camp2012identity,
    title = {Identity Theft},
    author = {Camp, L. Jean and Johnson, M Eric},
    journal = {The Economics of Financial and Medical Identity Theft},
    pages = {17--30},
    year = {2012},
    note = {Springer US} }

  4. L. Jean Camp and M Eric Johnson. Security and Privacy as Market Failures. The Economics of Financial and Medical Identity Theft, pp 53--60, 2012.
    Note: Springer US.
    @Article{ camp2012security,
    title = {Security and Privacy as Market Failures},
    url = {http://www.ljean.com/files/WWW06camp.pdf},
    author = {Camp, L. Jean and Johnson, M Eric},
    journal = {The Economics of Financial and Medical Identity Theft},
    pages = {53--60},
    year = {2012},
    note = {Springer US} }

  5. L. Jean Camp and M Eric Johnson. Defeating the Greatest Masquerade. The Economics of Financial and Medical Identity Theft, pp 31--39, 2012.
    Note: Springer US.
    @Article{ camp2012defeating,
    title = {Defeating the Greatest Masquerade},
    author = {Camp, L. Jean and Johnson, M Eric},
    journal = {The Economics of Financial and Medical Identity Theft},
    pages = {31--39},
    year = {2012},
    note = {Springer US} }

  6. Vaibhav Garg and L. Jean Camp. End User Perception of Online Risk Under Uncertainty. Hawaii International Conference On System Sciences, (Manoa, HI), pp 13--16, January 2012.
    Keywords: Mental Models.
    @Article{ garg2012enduser,
    title = {End User Perception of Online Risk Under Uncertainty},
    author = {Garg, Vaibhav and Camp, L. Jean},
    keywords = "Mental Models",
    month = {January},
    url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6149221&abstractAccess=no&userType=inst},
    journal = {Hawaii International Conference On System Sciences, (Manoa, HI)},
    pages = {13--16},
    year = {2012} }

  7. Vaibhav Garg and L. Jean Camp. Gandhigiri in cyberspace: a novel approach to information ethics. ACM SIGCAS Computers and Society, 42(1):9--20, 2012.
    Keywords: Internet Governance.
    @Article{ garg2012gandhigiri,
    title = {Gandhigiri in cyberspace: a novel approach to information ethics},
    url = {http://www.ljean.com/files/Gandhigiri.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean},
    journal = {ACM SIGCAS Computers and Society},
    volume = {42},
    number = {1},
    pages = {9--20},
    year = {2012},
    keywords = {Internet Governance},
    publisher = {ACM} }

  8. Vaibhav Garg, Chris Kanich, and L. Jean Camp. Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. at WEIS, 2012.
    Keywords: E-Crime.
    @Article{ garg2012analysis,
    title = {Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer},
    url = {http://www.econinfosec.org/archive/weis2012/papers/Garg_WEIS2012.pdf},
    author = {Garg, Vaibhav and Kanich, Chris and Camp, L. Jean},
    journal = {at WEIS},
    keywords = "E-Crime",
    year = {2012} }

  9. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter. Proceedings of the 5th international conference on Trust and Trustworthy Computing. Springer-Verlag, 2012.
    @Article{ katzenbeisser2012proceedings,
    title = {Proceedings of the 5th international conference on Trust and Trustworthy Computing},
    author = {Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike},
    year = {2012},
    journal = {Springer-Verlag} }

  10. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography and Data Security, pp 102--112, 2012.
    Note: Springer Berlin/Heidelberg.
    Keywords: Insider Threat.
    @Article{ liu2012beyond,
    title = {Beyond Risk-Based Access Control: Towards Incentive-Based Access Control},
    author = {Liu, Debin and Li, Ninghui and Wang, XiaoFeng and Camp, L. Jean},
    journal = {Financial Cryptography and Data Security},
    pages = {102--112},
    year = {2012},
    keywords = "Insider Threat",
    note = {Springer Berlin/Heidelberg} }

  11. Greg Norcie, Kelly Caine, and L. Jean Camp. Torpid: Delay and Difficult in the Tor Bundle. 2012.
    @Article{ norcietorpid,
    title = {Torpid: Delay and Difficult in the Tor Bundle},
    author = {Norcie, Greg and Caine, Kelly and Camp, L. Jean},
    year = {2012} }

  12. Andrew S Patrick and L. Jean Camp. Harm Mitigation from the Release of Personal Identity Information. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp 309-330, 2012.
    Note: Business Science Reference.
    Keywords: Privacy, Economics of Security.
    @Article{ patrick2012harm,
    title = {Harm Mitigation from the Release of Personal Identity Information},
    url = {http://www.irma-international.org/viewtitle/61506/},
    author = {Patrick, Andrew S and Camp, L. Jean},
    journal = {Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards},
    pages = {309-330},
    year = {2012},
    keywords = "Privacy, Economics of Security",
    note = {Business Science Reference} }

  13. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security.
    @Article{ shankar2012aging,
    title = {Aging, Privacy, and Home-Based Computing: Designing for Privacy},
    url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5740829},
    author = {Shankar, Kalpana and Camp, L. Jean and Connelly, Kay and Huber, Lesa},
    journal = {Pervasive Computing, IEEE},
    volume = {11},
    number = {99},
    pages = {46--54},
    year = {2012},
    keywords = "Human-Centered Security",
    publisher = {IEEE} }

  14. K Shankar, L Huber, L. Jean Camp, K Caine, and K Connelly. Finding the older user in home-based computing studies. Gerontechnology, 11(2):305, 2012.
    Keywords: Aging.
    @Article{ shankar2012finding,
    title = {Finding the older user in home-based computing studies},
    url = {http://gerontechnology.info/index.php/journal/article/view/gt.2012.11.02.545.00},
    author = {Shankar, K and Huber, L and Camp, L. Jean and Caine, K and Connelly, K},
    journal = {Gerontechnology},
    volume = {11},
    number = {2},
    pages = {305},
    keywords = "Aging",
    year = {2012} }

Conference publications (11)
  1. Zheng Dong, Vaibhav Garg, L. Jean Camp, and Apu Kapadia. Pools, clubs and security: designing for a party not a person. In Proceedings of the 2012 New Security Paradigms Workshop, pages 77--86, September 2012. ACM.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security.
    @InProceedings{ dong2012pools,
    title = {Pools, clubs and security: designing for a party not a person},
    url = {http://www.ljean.com/files/SocialPower.pdf},
    author = {Dong, Zheng and Garg, Vaibhav and Camp, L. Jean and Kapadia, Apu},
    booktitle = {Proceedings of the 2012 New Security Paradigms Workshop},
    pages = {77--86},
    month = {September},
    year = {2012},
    keywords = "Peer Production, Crowdsourcing of Security, Economics of Security",
    organization = {ACM} }

  2. Zheng Dong and L. Jean Camp. Peersec: Towards peer production and crowdsourcing for enhanced security. In The 7th USENIX Workshop on Hot Topics in Security (HotSec), August 2012.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security.
    @InProceedings{ dong2012peersec,
    title = {Peersec: Towards peer production and crowdsourcing for enhanced security},
    url = {http://www.cs.indiana.edu/~zhdong/publication/PeerSec.pdf},
    author = {Dong, Zheng and Camp, L. Jean},
    booktitle = {The 7th USENIX Workshop on Hot Topics in Security (HotSec)},
    keywords = "Peer Production, Crowdsourcing of Security, Economics of Security",
    month = {August},
    year = {2012} }

  3. Vaibhav Garg, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. Risk communication design: video vs. text. In International Symposium on Privacy Enhancing Technologies Symposium, pages 279--298, July 2012. Springer Berlin Heidelberg.
    Keywords: Mental Models, Aging.
    @InProceedings{ garg2012risk,
    title = {Risk communication design: video vs. text},
    url = {http://www.ljean.com/files/RiskOlderAdults.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean and Connelly, Katherine and Lorenzen-Huber, Lesa},
    booktitle = {International Symposium on Privacy Enhancing Technologies Symposium},
    pages = {279--298},
    keywords = "Mental Models, Aging",
    month = {July},
    year = {2012},
    organization = {Springer Berlin Heidelberg} }

  4. Jim Blythe and L. Jean Camp. Implementing Mental Models. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 86--90, May 2012. IEEE.
    Keywords: Mental Models.
    @InProceedings{ blythe2012implementing,
    title = {Implementing Mental Models},
    url = {http://www.ljean.com/files/Implementing.pdf},
    author = {Blythe, Jim and Camp, L. Jean},
    booktitle = {Security and Privacy Workshops (SPW), 2012 IEEE Symposium on},
    pages = {86--90},
    keywords = "Mental Models",
    month = {May},
    year = {2012},
    organization = {IEEE} }

  5. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Passive Biometrics for Pervasive Wearable Devices (Poster paper). In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: authentication, ists, poster, project-tish, security, sensors, wearable.
    @InProceedings{ cornelius:biometrics-poster,
    author = {Cory Cornelius and Zachary Marois and Jacob Sorber and Ron Peterson and Shrirang Mare and David Kotz},
    booktitle = {Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile)},
    entrysubtype = {poster},
    keywords = {authentication, ists, poster, project-tish, security, sensors, wearable},
    month = {February},
    title = {Passive Biometrics for Pervasive Wearable Devices ({P}oster paper)},
    url = {https://www.shrirangmare.com/papers/cornelius-biometrics-poster.pdf},
    year = {2012} }

  6. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mHealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable.
    @InProceedings{ sorber:amulet,
    articleno = {7},
    author = {Jacob Sorber and Minho Shin and Ronald Peterson and Cory Cornelius and Shrirang Mare and Aarathi Prasad and Zachary Marois and Emma Smithayer and David Kotz},
    booktitle = hotmobile,
    doi = {10.1145/2162081.2162092},
    entrysubtype = {workshop},
    keywords = {ists, mhealth, privacy, project-amulet, security, sensors, wearable},
    month = {February},
    numpages = {6},
    title = {An Amulet for Trustworthy Wearable {mH}ealth},
    year = {2012} }

  7. John F Duncan and L. Jean Camp. Conducting an Ethical Study of Web Traffic.. In CSET, 2012.
    @InProceedings{ duncan2012conducting,
    title = {Conducting an Ethical Study of Web Traffic.},
    url = {http://www.ljean.com/files/CSETS_12.pdf},
    author = {Duncan, John F and Camp, L. Jean},
    booktitle = {CSET},
    year = {2012} }

  8. Vaibhav Garg and L. Jean Camp. End user perception of online risk under uncertainty. In System Science (HICSS), 2012 45th Hawaii International Conference on, pages 3278--3287, 2012. IEEE.
    @InProceedings{ garg2012end,
    title = {End user perception of online risk under uncertainty},
    url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6149221&abstractAccess=no&userType=inst},
    author = {Garg, Vaibhav and Camp, L. Jean},
    booktitle = {System Science (HICSS), 2012 45th Hawaii International Conference on},
    pages = {3278--3287},
    year = {2012},
    organization = {IEEE} }

  9. Timothy Kelley, L. Jean Camp, Suzanne Lien, and Douglas Stebila. Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences. In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, pages 47--54, 2012. ACM.
    Keywords: Economics of Security.
    @InProceedings{ kelley2012self,
    title = {Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences},
    url = {http://www.douglas.stebila.ca/research/papers/klcs12/},
    author = {Kelley, Timothy and Camp, L. Jean and Lien, Suzanne and Stebila, Douglas},
    booktitle = {Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results},
    pages = {47--54},
    year = {2012},
    keywords = {Economics of Security},
    organization = {ACM} }

  10. Greg Norcie, Kelly Caine, and L. Jean Camp. Eliminating Stop-Points in the Installation and Use of Anonymity Systems: a Usability Evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012.
    @InProceedings{ norcie2012eliminating,
    title = {Eliminating Stop-Points in the Installation and Use of Anonymity Systems: a Usability Evaluation of the Tor Browser Bundle},
    author = {Norcie, Greg and Caine, Kelly and Camp, L. Jean},
    booktitle = {5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS)},
    year = {2012} }

  11. Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Reddy Gopavaram, and Elisa Bertino. Demonstrating a lightweight data provenance for sensor networks. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 1022--1024, 2012. ACM.
    @InProceedings{ sgopavar2012demonstrating,
    title = {Demonstrating a lightweight data provenance for sensor networks},
    author = {Shebaro, Bilal and Sultana, Salmin and Reddy Gopavaram, Shakthidhar Reddy and Bertino, Elisa},
    booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
    pages = {1022--1024},
    year = {2012},
    organization = {ACM} }

Posters and Presentations (3)
  1. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Springer, 2012.
    @Misc{ blythe2012financial,
    title = {Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers},
    author = {Blythe, Jim and Dietrich, Sven and Camp, L. Jean},
    year = {2012},
    howpublished = {Springer} }

  2. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2012.
    @Misc{ camp2012economics,
    title = {The Economics of Financial and Medical Identity Theft},
    url = {http://www.barnesandnoble.com/p/economics-of-information-security-l-jean-camp/1101307450/2670903586826?st=PLA&sid=BNB_DRS_Marketplace+Shopping+greatbookprices_00000000&2sid=Google_&sourceId=PLGoP23915&k_clickid=3x23915},
    author = {Camp, L. Jean and Johnson, M Eric},
    year = {2012},
    howpublished = {Springer} }

  3. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Springer, 2012.
    @Misc{ katzenbeisser2012trust,
    title = {Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings},
    url = {http://www.ljean.com/trustRisk/},
    author = {Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen},
    year = {2012},
    howpublished = {Springer} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:15 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House