default search action
L. Jean Camp
Person information
- affiliation: Indiana University, Bloomington, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c88]Peter J. Caven, Zitao Zhang, Jacob Abbott, Xinyao Ma, L. Jean Camp:
Comparing the Use and Usefulness of Four IoT Security Labels. CHI 2024: 827:1-827:31 - 2023
- [c87]Dalyapraz Manatova, L. Jean Camp, Julia R. Fox, Sandra Kübler, Maria A Shardakova, Inna Kouper:
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape. EuroS&P Workshops 2023: 170-176 - [c86]Anesu Chaora, Nathan L. Ensmenger, L. Jean Camp:
Discourse, Challenges, and Prospects Around the Adoption and Dissemination of Software Bills of Materials (SBOMs). ISTAS 2023: 1-4 - 2022
- [j45]Surya Nepal, Ryan K. L. Ko, Marthie Grobler, L. Jean Camp:
Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022) - [j44]Sanchari Das, Christena Nippert-Eng, L. Jean Camp:
Evaluating user susceptibility to phishing attacks. Inf. Comput. Secur. 30(1): 1-18 (2022) - [c85]Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, L. Jean Camp:
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains. eCrime 2022: 1-12 - [c84]Jacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana R. Ringenberg, Vafa Andalibi, L. Jean Camp:
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. EuroUSEC 2022: 98-110 - [c83]Vafa Andalibi, Erfan Sadeqi Azer, L. Jean Camp:
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures. HICSS 2022: 1-10 - [c82]Peter J. Caven, Shakthidhar Reddy Gopavaram, L. Jean Camp:
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. MILCOM 2022: 687-692 - [i11]Jennifer Mankoff, Devva Kasnitz, Disability Studies, L. Jean Camp, Jonathan Lazar, Harry Hochheiser:
Areas of Strategic Visibility: Disability Bias in Biometrics. CoRR abs/2208.04712 (2022) - [i10]Natnatee Dokmai, L. Jean Camp, Ryan Henry:
A Proposal for Assisted Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 1082 (2022) - 2021
- [j43]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using bursty announcements for detecting BGP routing anomalies. Comput. Networks 188: 107835 (2021) - [j42]Hilda Hadan, Nicolás Serrano, L. Jean Camp:
A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents. J. Cybersecur. 7(1) (2021) - [j41]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian evaluation of privacy-preserving risk communication for user android app preferences. Inf. Comput. Secur. 29(4): 680-693 (2021) - [c81]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). ACSAC 2021: 337-348 - [c80]Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan:
Human and Organizational Factors in Public Key Certificate Authority Failures. CCS 2021: 2414-2416 - [c79]Sanchari Das, Andrew Kim, L. Jean Camp:
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. Financial Cryptography (2) 2021: 406-413 - [c78]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. HAISA 2021: 127-137 - [c77]Sanchari Das, Ben Jelen, Andrew Kim, Lesa L. Huber, L. Jean Camp:
Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication. HICSS 2021: 1-10 - [c76]DongInn Kim, Vafa Andalibi, Linda Jean Camp:
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. SP (Workshops) 2021: 260-267 - [i9]Sanchari Das, Robert S. Gutzwiller, Rod D. Roscoe, Prashanth Rajivan, Yang Wang, L. Jean Camp, Roberto Hoyle:
Panel: Humans and Technology for Inclusive Privacy and Security. CoRR abs/2101.07377 (2021) - [i8]Vafa Andalibi, Eliot Lear, DongInn Kim, L. Jean Camp:
On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. CoRR abs/2107.06372 (2021) - [i7]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. CoRR abs/2112.02412 (2021) - 2020
- [j40]L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j39]Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. IEEE Secur. Priv. 18(4): 38-47 (2020) - [c75]Sanchari Das, Shrirang Mare, L. Jean Camp:
Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability. CIC 2020: 153-160 - [c74]Jayati Dev, L. Jean Camp:
User Engagement with Chatbots: A Discursive Psychology Approach. CIU 2020: 52:1-52:4 - [c73]Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp:
User-Centered Risk Communication for Safer Browsing. Financial Cryptography Workshops 2020: 18-35 - [c72]Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp:
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory. HAISA 2020: 109-120 - [c71]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. HAISA 2020: 211-223 - [c70]Sanchari Das, Bingxing Wang, Andrew Kim, L. Jean Camp:
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies. HICSS 2020: 1-10 - [c69]DongInn Kim, Vafa Andalibi, L. Jean Camp:
Fingerprinting Edge and Cloud Services in IoT. SADFE 2020: 13-21 - [c68]Jayati Dev, Pablo Moriano, L. Jean Camp:
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. SOUPS @ USENIX Security Symposium 2020: 81-97 - [c67]Laura Calloway, Hilda Hadan, Shakthidhar Gopavaram, Shrirang Mare, L. Jean Camp:
Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic. WPES@CCS 2020: 181-189 - [e4]Matthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12063, Springer 2020, ISBN 978-3-030-54454-6 [contents] - [i6]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. CoRR abs/2006.09531 (2020) - [i5]Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp:
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory. CoRR abs/2006.16380 (2020)
2010 – 2019
- 2019
- [j38]L. Jean Camp:
Using ML to Block BGP Hijacking. login Usenix Mag. 44(4) (2019) - [c66]Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, L. Jean Camp:
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. CIC 2019: 306-313 - [c65]Sanchari Das, Bingxi Wang, Linda Jean Camp:
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content. HAISA 2019: 143-154 - [c64]Sanchari Das, Bingxi Wang, Zachary Tingle, Linda Jean Camp:
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. HAISA 2019: 166-178 - [c63]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c62]Vafa Andalibi, DongInn Kim, L. Jean Camp:
Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. HotEdge 2019 - [i4]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using Bursty Announcements for Early Detection of BGP Routing Anomalies. CoRR abs/1905.05835 (2019) - [i3]Sanchari Das, Bingxi Wang, Zachary Tingle, L. Jean Camp:
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. CoRR abs/1908.05901 (2019) - [i2]Sanchari Das, Bingxi Wang, L. Jean Camp:
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content. CoRR abs/1908.05902 (2019) - 2018
- [j37]Paul van Schaik, Jurjen Jansen, Joseph A. Onibokun, L. Jean Camp, Petko Kusev:
Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Comput. Hum. Behav. 78: 283-297 (2018) - [j36]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 4-29 (2018) - [c61]Sanchari Das, Andrew Dingman, L. Jean Camp:
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. Financial Cryptography 2018: 160-179 - [c60]Jayati Dev, Sanchari Das, Linda Jean Camp:
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. HAISA 2018: 135-146 - [c59]Jayati Dev, Sanchari Das, L. Jean Camp:
Understanding privacy concerns of whatsapp users in India: poster. HotSoS 2018: 28:1 - [c58]Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, L. Jean Camp:
Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. IoTDI 2018: 285-286 - [c57]Andrew Dingman, Gianpaolo Russo, George Osterholt, Tyler Uffelman, L. Jean Camp:
Poster Abstract: Good Advice That Just Doesn't Help. IoTDI 2018: 289-291 - 2017
- [j35]Pablo Moriano, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Comput. Secur. 70: 319-334 (2017) - [j34]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. Inf. Comput. Secur. 25(2): 190-205 (2017) - [c56]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Insider Threat Event Detection in User-System Interactions. MIST@CCS 2017: 1-12 - [c55]Sanchari Das, Gianpaolo Russo, Andrew C. Dingman, Jayati Dev, Olivia Kenny, L. Jean Camp:
A qualitative study on usability and acceptability of Yubico security key. STAST 2017: 28-39 - 2016
- [j33]Zheng Dong, Kevin Kane, L. Jean Camp:
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Trans. Priv. Secur. 19(2): 5:1-5:31 (2016) - [c54]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:
What Can Johnny Do?–Factors in an End-User Expertise Instrument. HAISA 2016: 199-208 - [c53]L. Jean Camp, Jacob Abbott, Siyu Chen:
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. HICSS 2016: 3656-3665 - [c52]Kevin Benton, L. Jean Camp, Martin Swany:
Bongo: A BGP speaker built for defending against bad routes. MILCOM 2016: 735-739 - [c51]Kevin Benton, L. Jean Camp:
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. SafeConfig@CCS 2016: 31-36 - [c50]Prashanth Rajivan, L. Jean Camp:
Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. WPI@SOUPS 2016 - 2015
- [j32]L. Jean Camp:
Respecting people and respecting privacy. Commun. ACM 58(7): 27-28 (2015) - [j31]Vaibhav Garg, L. Jean Camp:
Why cybercrime? SIGCAS Comput. Soc. 45(2): 20-28 (2015) - [c49]Kevin Benton, L. Jean Camp, Timothy Kelley, Martin Swany:
Filtering IP source spoofing using feasible path reverse path forwarding with SDN. CNS 2015: 733-734 - [c48]Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - [c47]Vaibhav Garg, L. Jean Camp:
Spare the rod, spoil the network security? Economic analysis of sanctions online. eCrime 2015: 59-68 - 2014
- [j30]Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly:
Privacy concerns in assisted living technologies. Ann. des Télécommunications 69(1-2): 75-88 (2014) - [j29]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c46]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - 2013
- [j28]Vaibhav Garg, Thomas Koster, Linda Jean Camp:
Cross-country analysis of spambots. EURASIP J. Inf. Secur. 2013: 3 (2013) - [j27]Lesa Lorenzen-Huber, Kalpana Shankar, Kelly E. Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, Lisa Borrero:
How In-Home Technologies Mediate Caregiving Relationships in Later Life. Int. J. Hum. Comput. Interact. 29(7): 441-455 (2013) - [j26]Vaibhav Garg, L. Jean Camp:
Heuristics and Biases: Implications for Security Design. IEEE Technol. Soc. Mag. 32(1): 73-79 (2013) - [c45]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116 - [c44]Vaibhav Garg, Sameer Patil, Apu Kapadia, L. Jean Camp:
Peer-produced privacy protection. ISTAS 2013: 147-154 - [c43]Vaibhav Garg, L. Jean Camp:
Cars, Condoms, and Facebook. ISC 2013: 280-289 - [c42]Vaibhav Garg, L. Jean Camp:
Macroeconomic Analysis of Malware. NDSS 2013 - [c41]Kevin Benton, L. Jean Camp, Vaibhav Garg:
Studying the effectiveness of android application permissions requests. PerCom Workshops 2013: 291-296 - [c40]Kevin Benton, L. Jean Camp, Chris Small:
OpenFlow vulnerability assessment. HotSDN 2013: 151-152 - [p3]Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. The Economics of Information Security and Privacy 2013: 157-180 - [p2]Vaibhav Garg, L. Jean Camp, Chris Kanich:
Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer. The Economics of Information Security and Privacy 2013: 301-321 - 2012
- [b3]L. Jean Camp, M. Eric Johnson:
The Economics of Financial and Medical Identity Theft. Springer 2012, ISBN 978-1-4614-1917-4, pp. I-XI, 1-166 - [j25]Kalpana Shankar, L. Jean Camp, Kay Connelly, Lesa L. Huber:
Aging, Privacy, and Home-Based Computing: Developing a Design Framework. IEEE Pervasive Comput. 11(4): 46-54 (2012) - [j24]Vaibhav Garg, L. Jean Camp:
Gandhigiri in cyberspace: a novel approach to information ethics. SIGCAS Comput. Soc. 42(1): 9-20 (2012) - [c39]Vaibhav Garg, L. Jean Camp:
End User Perception of Online Risk under Uncertainty. HICSS 2012: 3278-3287 - [c38]Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia:
Pools, clubs and security: designing for a party not a person. NSPW 2012: 77-86 - [c37]Vaibhav Garg, L. Jean Camp, Katherine H. Connelly, Lesa Lorenzen-Huber:
Risk Communication Design: Video vs. Text. Privacy Enhancing Technologies 2012: 279-298 - [c36]Jim Blythe, L. Jean Camp:
Implementing Mental Models. IEEE Symposium on Security and Privacy Workshops 2012: 86-90 - [c35]Zheng Dong, L. Jean Camp:
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security. HotSec 2012 - [c34]John F. Duncan, L. Jean Camp:
Conducting an Ethical Study of Web Traffic. CSET 2012 - [c33]Vaibhav Garg, Chris Kanich, L. Jean Camp:
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. WEIS 2012 - [c32]Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. WEIS 2012 - [e3]Jim Blythe, Sven Dietrich, L. Jean Camp:
Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8 [contents] - [e2]Stefan Katzenbeisser, Edgar R. Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - 2011
- [j23]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Security Risk Management Using Incentives. IEEE Secur. Priv. 9(6): 20-28 (2011) - [j22]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home. J. Medical Syst. 35(5): 1181-1195 (2011) - [j21]Zheng Dong, L. Jean Camp:
The decreasing marginal value of evaluation network size. SIGCAS Comput. Soc. 41(1): 23-37 (2011) - [c31]Vaibhav Garg, Nathaniel Husted, L. Jean Camp:
The smuggling theory approach to organized digital crime. eCrime Researchers Summit 2011: 1-7 - [c30]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography 2011: 102-112 - [c29]Jim Blythe, L. Jean Camp, Vaibhav Garg:
Targeted risk communication for computer security. IUI 2011: 295-298 - 2010
- [j20]L. Jean Camp:
Identity Management's Misaligned Incentives. IEEE Secur. Priv. 8(6): 90-94 (2010) - [j19]Debin Liu, L. Jean Camp, XiaoFeng Wang, Lusha Wang:
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 29-45 (2010) - [c28]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. IHI 2010: 153-162 - [c27]Azadeh Nematzadeh, L. Jean Camp:
Threat analysis of online health information system. PETRA 2010
2000 – 2009
- 2009
- [j18]Camilo H. Viecco, Alex Tsow, L. Jean Camp:
A privacy-aware architecture for a Web rating system. IBM J. Res. Dev. 53(2): 7 (2009) - [j17]L. Jean Camp:
Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3): 37-46 (2009) - [c26]L. Jean Camp:
Hardening the Network from the Friend Within. ACISP 2009: 249 - [c25]L. Jean Camp:
Design for Trust in Ambient and Ubiquitous Computing. ATC 2009: 1 - [c24]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Mitigating Inadvertent Insider Threats with Incentives. Financial Cryptography 2009: 1-16 - [c23]Camilo H. Viecco, L. Jean Camp:
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy. IFIPTM 2009: 234-251 - [c22]John F. Duncan, L. Jean Camp, William R. Hazlewood:
The portal monitor: a privacy-enhanced event-driven system for elder care. PERSUASIVE 2009: 36 - 2008
- [j16]Camilo H. Viecco, L. Jean Camp:
A Life or Death InfoSec Subversion. IEEE Secur. Priv. 6(5): 74-76 (2008) - [j15]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastructure Prot. 1: 75-80 (2008) - [c21]Hillary Elmore, L. Jean Camp, Brandon Stephens:
Diffusion and Adoption of IPv6 in the United States. WEIS 2008 - 2007
- [b2]L. Jean Camp:
Economics of Identity Theft - Avoidance, Causes and Possible Cures. Springer 2007, ISBN 978-0-387-34589-5, pp. I-XII, 1-184 - [c20]Christopher Thorpe, Jessica Hammer, L. Jean Camp, Jon Callas, Mike Bond:
Virtual Economies: Threats and Risks. Financial Cryptography 2007: 239-244 - [c19]Farzaneh Asgharpour, Debin Liu, L. Jean Camp:
Mental Models of Security Risks. Financial Cryptography 2007: 367-377 - [c18]Farzaneh Asgharpour, Debin Liu, L. Jean Camp:
Mental Models of Computer Security Risks. WEIS 2007 - 2006
- [c17]L. Jean Camp, Cathleen McGrath, Alla Genkina:
Security and Morality: A Tale of User Deceit. MTW 2006 - [c16]L. Jean Camp:
Reliable, Usable Signaling to Defeat Masquerade Attacks. WEIS 2006 - [c15]Debin Liu, L. Jean Camp:
Proof of Work can Work. WEIS 2006 - 2005
- [c14]L. Jean Camp, Warigia Bowman, Allan Friedman:
Voting, vote capture & vote counting symposium. DG.O 2005: 198-199 - 2004
- [j14]Rebecca T. Mercuri, L. Jean Camp:
The code of elections. Commun. ACM 47(10): 52-57 (2004) - [j13]L. Jean Camp:
Digital identity. IEEE Technol. Soc. Mag. 23(3): 34-41 (2004) - [c13]L. Jean Camp:
Identity the Civic Scenario. DG.O 2004 - [c12]L. Jean Camp:
Identity the Civic Scenario (Workshop report). DG.O 2004 - [c11]L. Jean Camp:
Mental Models of Computer Security. Financial Cryptography 2004: 106-111 - [p1]L. Jean Camp, Catherine Wolfram:
Pricing Security - A Market in Vulnerabilities. Economics of Information Security 2004: 17-34 - [e1]L. Jean Camp, Stephen Lewis:
Economics of Information Security. Advances in Information Security 12, Springer 2004, ISBN 1-4020-8089-1 [contents] - [r1]Ka-Ping Yee, L. Jean Camp:
Human Implications of Technology. The Practical Handbook of Internet Computing 2004 - 2003
- [j12]L. Jean Camp:
Access Denied. IEEE Secur. Priv. 1(5): 82-85 (2003) - [j11]L. Jean Camp:
First Principles of Copyright for DRM Design. IEEE Internet Comput. 7(3): 59-65 (2003) - [j10]L. Jean Camp:
Code, coding and coded perspectives. J. Inf. Commun. Ethics Soc. 1(1): 49-60 (2003) - [c10]L. Jean Camp:
Panel Report: Open Code for Digital Government. DG.O 2003 - [c9]L. Jean Camp:
Identity, authentication, and identifiers in digital government. ISTAS/CPTED 2003: 10-13 - 2002
- [j9]Serena Syme, L. Jean Camp:
The Governance of Code: Open Land vs. UCITA Land. SIGCAS Comput. Soc. 32(3): 2 (2002) - [j8]Serena Chan, L. Jean Camp:
Law enforcement surveillance in the network society. IEEE Technol. Soc. Mag. 21(2): 22-30 (2002) - [c8]L. Jean Camp:
Designing for Trust. Trust, Reputation, and Security 2002: 15-29 - [c7]L. Jean Camp:
DRM: doesn't realy mean digital copyright management. CCS 2002: 78-87 - [c6]Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151 - 2001
- [b1]L. Jean Camp:
Trust and Risk in Internet Commerce. MIT Press 2001, ISBN 978-0-262-53197-9, pp. I-XIII, 1-279 - [j7]L. Jean Camp, Serena Syme:
Code as Embedded Speech, Machine, and Service. J. Inf. Law Technol. 2001(2) (2001) - [j6]L. Jean Camp:
An Atomicity-Generating Protocol for Anonymous Currencies. IEEE Trans. Software Eng. 27(3): 272-278 (2001) - [c5]L. Jean Camp, Helen Nissenbaum, Cathleen McGrath:
Trust: A Collision of Paradigms. Financial Cryptography 2001: 82-96 - [i1]Carolyn Gideon, L. Jean Camp:
Limits To Certainty in QoS Pricing and Bandwidth. CoRR cs.CY/0110016 (2001) - 2000
- [j5]L. Jean Camp, Y. T. Chien:
The internet as public space: concepts, issues, and implications in public policy. SIGCAS Comput. Soc. 30(3): 13-19 (2000) - [c4]Sara Basse, L. Jean Camp, Dan Gillmor, Wiley Hodges, Bruce Umbaugh, Danny Yee:
Student paper competition (abstract only). CFP 2000: 285
1990 – 1999
- 1999
- [j4]L. Jean Camp:
Web Security and Privacy: An American Perspective. Inf. Soc. 15(4): 249-256 (1999) - 1997
- [j3]L. Jean Camp, Marvin A. Sirbu:
Critical issues in Internet commerce. IEEE Commun. Mag. 35(5): 58-62 (1997) - [c3]David A. Evensky, Ann C. Gentile, L. Jean Camp, Robert C. Armstrong:
Lilith: Scalable Execution of User Code for Distributed Computing. HPDC 1997: 305-314 - 1995
- [c2]L. Jean Camp, Marvin A. Sirbu, J. Doug Tygar:
Token and Notational Money in Electronic Commerce. USENIX Workshop on Electronic Commerce 1995 - 1994
- [j2]L. Jean Camp:
Privacy: from abstraction to applications. SIGCAS Comput. Soc. 24(3): 8-15 (1994) - [j1]L. Jean Camp, J. D. Tygar:
Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): 59-71 (1994) - 1992
- [c1]Linda Jean Camp, Marvin A. Sirbu:
Networking strategy at traveler's insurance. SIGCPR 1992: 450-462
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint