2007 |
18 | EE | Farzaneh Asgharpour,
Debin Liu,
L. Jean Camp:
Mental Models of Security Risks.
Financial Cryptography 2007: 367-377 |
2006 |
17 | EE | L. Jean Camp,
Cathleen McGrath,
Alla Genkina:
Security and Morality: A Tale of User Deceit.
MTW 2006 |
2005 |
16 | EE | L. Jean Camp,
Warigia Bowman,
Allan Friedman:
Voting, vote capture & vote counting symposium.
DG.O 2005: 198-199 |
2004 |
15 | EE | L. Jean Camp:
Identity the Civic Scenario (Workshop report).
DG.O 2004 |
14 | EE | L. Jean Camp:
Identity the Civic Scenario.
DG.O 2004 |
13 | EE | L. Jean Camp:
Mental Models of Computer Security.
Financial Cryptography 2004: 106-111 |
12 | EE | Rebecca T. Mercuri,
L. Jean Camp:
The code of elections.
Commun. ACM 47(10): 52-57 (2004) |
2003 |
11 | EE | L. Jean Camp:
Panel Report: Open Code for Digital Government.
DG.O 2003 |
10 | EE | L. Jean Camp:
First Principles of Copyright for DRM Design.
IEEE Internet Computing 7(3): 59-65 (2003) |
2002 |
9 | EE | L. Jean Camp:
DRM: doesn't realy mean digital copyright management.
ACM Conference on Computer and Communications Security 2002: 78-87 |
8 | EE | Rebecca N. Wright,
L. Jean Camp,
Ian Goldberg,
Ronald L. Rivest,
Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel.
Financial Cryptography 2002: 147-151 |
7 | EE | L. Jean Camp:
Designing for Trust.
Trust, Reputation, and Security 2002: 15-29 |
2001 |
6 | EE | L. Jean Camp,
Helen Nissenbaum,
Cathleen McGrath:
Trust: A Collision of Paradigms.
Financial Cryptography 2001: 82-96 |
5 | EE | Carolyn Gideon,
L. Jean Camp:
Limits To Certainty in QoS Pricing and Bandwidth
CoRR cs.CY/0110016: (2001) |
4 | EE | L. Jean Camp:
An Atomicity-Generating Protocol for Anonymous Currencies.
IEEE Trans. Software Eng. 27(3): 272-278 (2001) |
3 | EE | L. Jean Camp,
Serena Syme:
Code as Embedded Speech, Machine, and Service.
Journal of Information, Law and Technology 2001(2): (2001) |
1999 |
2 | EE | L. Jean Camp:
Web Security and Privacy: An American Perspective.
Inf. Soc. 15(4): (1999) |
1994 |
1 | EE | L. Jean Camp,
J. D. Tygar:
Providing Auditing While Protecting Privacy.
Inf. Soc. 10(1): (1994) |