2006 |
19 | EE | Timothy Rosenberg,
Lance J. Hoffman:
Taking the network on the road: Portable network solutions for computer security educators.
ACM Journal of Educational Resources in Computing 6(4): (2006) |
18 | EE | Lance J. Hoffman,
Kim Lawson-Jenkins,
Jeremy J. Blum:
Trust beyond security: an expanded trust model.
Commun. ACM 49(7): 94-101 (2006) |
17 | EE | Timothy Rosenberg,
Lance J. Hoffman:
Taking Networks on the Road: Portable Solutions for Security Educators.
IEEE Security & Privacy 4(1): 57-60 (2006) |
2005 |
16 | EE | Lance J. Hoffman,
Timothy Rosenberg,
Ronald Dodge,
Daniel Ragsdale:
Exploring a National Cybersecurity Exercise for Universities.
IEEE Security & Privacy 3(5): 27-33 (2005) |
2004 |
15 | EE | Jeremy J. Blum,
Azim Eskandarian,
Lance J. Hoffman:
Challenges of intervehicle ad hoc networks.
IEEE Transactions on Intelligent Transportation Systems 5(4): 347-351 (2004) |
2003 |
14 | | Lance J. Hoffman,
Timothy Rosenberg,
Steve Willmore:
The Portable Educational Network (PEN).
IAW 2003: 217-220 |
2001 |
13 | EE | Lance J. Hoffman,
Lorrie Faith Cranor:
Internet voting for public officials: introduction.
Commun. ACM 44(1): 69-71 (2001) |
1999 |
12 | EE | Rachna Dhamija,
Rachelle S. Heller,
Lance J. Hoffman:
Teaching E-Commerce to a Multidisciplinary Class.
Commun. ACM 42(9): 50-55 (1999) |
1994 |
11 | | Paul C. Clark,
Lance J. Hoffman:
BITS: A Smartcard Protected Operating System.
Commun. ACM 37(11): 66-70 (1994) |
10 | | Lance J. Hoffman,
Faraz A. Ali,
Steven L. Heckler,
Ann Huybrechts:
Cryptography Policy.
Commun. ACM 37(9): 109-117 (1994) |
1993 |
9 | EE | John A. Fitch III,
Lance J. Hoffman:
A shortest path network security model.
Computers & Security 12(2): 169-189 (1993) |
1992 |
8 | | Lance J. Hoffman:
Reducing Society's Vulnerability as Computers and Networks Proliferate.
IFIP Congress (2) 1992: 554-563 |
1989 |
7 | EE | Lance J. Hoffman:
Risk analysis and computer security: Towards a theory at last.
Computers & Security 8(1): 23-24 (1989) |
6 | EE | Lance J. Hoffman:
Smoking out the bad actors: Risk analysis in the age of the microcomputer.
Computers & Security 8(4): 325-344 (1989) |
1982 |
5 | EE | Lance J. Hoffman:
Impacts of information system vulnerabilities on society.
AFIPS National Computer Conference 1982: 461-467 |
1980 |
4 | | Theodore D. Friedman,
Lance J. Hoffman:
Towards a Fail-Safe Approach to Secure Databases.
IEEE Symposium on Security and Privacy 1980: 18-21 |
1979 |
3 | EE | Lance J. Hoffman:
The application of networks in basic computer science and information science research.
Inf. Process. Manage. 15(6): 269-280 (1979) |
1974 |
2 | | Theodore D. Friedman,
Lance J. Hoffman:
Execution Time Requirements for Encipherment Programs.
Commun. ACM 17(8): 445-449 (1974) |
1969 |
1 | | Lance J. Hoffman:
Computers and Privacy: A Survey.
ACM Comput. Surv. 1(2): 85-103 (1969) |