dblp.uni-trier.dewww.uni-trier.de

Lance J. Hoffman

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
19EETimothy Rosenberg, Lance J. Hoffman: Taking the network on the road: Portable network solutions for computer security educators. ACM Journal of Educational Resources in Computing 6(4): (2006)
18EELance J. Hoffman, Kim Lawson-Jenkins, Jeremy J. Blum: Trust beyond security: an expanded trust model. Commun. ACM 49(7): 94-101 (2006)
17EETimothy Rosenberg, Lance J. Hoffman: Taking Networks on the Road: Portable Solutions for Security Educators. IEEE Security & Privacy 4(1): 57-60 (2006)
2005
16EELance J. Hoffman, Timothy Rosenberg, Ronald Dodge, Daniel Ragsdale: Exploring a National Cybersecurity Exercise for Universities. IEEE Security & Privacy 3(5): 27-33 (2005)
2004
15EEJeremy J. Blum, Azim Eskandarian, Lance J. Hoffman: Challenges of intervehicle ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 5(4): 347-351 (2004)
2003
14 Lance J. Hoffman, Timothy Rosenberg, Steve Willmore: The Portable Educational Network (PEN). IAW 2003: 217-220
2001
13EELance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001)
1999
12EERachna Dhamija, Rachelle S. Heller, Lance J. Hoffman: Teaching E-Commerce to a Multidisciplinary Class. Commun. ACM 42(9): 50-55 (1999)
1994
11 Paul C. Clark, Lance J. Hoffman: BITS: A Smartcard Protected Operating System. Commun. ACM 37(11): 66-70 (1994)
10 Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts: Cryptography Policy. Commun. ACM 37(9): 109-117 (1994)
1993
9EEJohn A. Fitch III, Lance J. Hoffman: A shortest path network security model. Computers & Security 12(2): 169-189 (1993)
1992
8 Lance J. Hoffman: Reducing Society's Vulnerability as Computers and Networks Proliferate. IFIP Congress (2) 1992: 554-563
1989
7EELance J. Hoffman: Risk analysis and computer security: Towards a theory at last. Computers & Security 8(1): 23-24 (1989)
6EELance J. Hoffman: Smoking out the bad actors: Risk analysis in the age of the microcomputer. Computers & Security 8(4): 325-344 (1989)
1982
5EELance J. Hoffman: Impacts of information system vulnerabilities on society. AFIPS National Computer Conference 1982: 461-467
1980
4 Theodore D. Friedman, Lance J. Hoffman: Towards a Fail-Safe Approach to Secure Databases. IEEE Symposium on Security and Privacy 1980: 18-21
1979
3EELance J. Hoffman: The application of networks in basic computer science and information science research. Inf. Process. Manage. 15(6): 269-280 (1979)
1974
2 Theodore D. Friedman, Lance J. Hoffman: Execution Time Requirements for Encipherment Programs. Commun. ACM 17(8): 445-449 (1974)
1969
1 Lance J. Hoffman: Computers and Privacy: A Survey. ACM Comput. Surv. 1(2): 85-103 (1969)

Coauthor Index

1Faraz A. Ali [10]
2Jeremy J. Blum [15] [18]
3Paul C. Clark [11]
4Lorrie Faith Cranor [13]
5Rachna Dhamija [12]
6Ronald Dodge [16]
7Azim Eskandarian [15]
8John A. Fitch III [9]
9Theodore D. Friedman [2] [4]
10Steven L. Heckler [10]
11Rachelle S. Heller [12]
12Ann Huybrechts [10]
13Kim Lawson-Jenkins [18]
14Daniel Ragsdale [16]
15Timothy Rosenberg [14] [16] [17] [19]
16Steve Willmore [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)