| 2006 |
| 19 | EE | Timothy Rosenberg,
Lance J. Hoffman:
Taking the network on the road: Portable network solutions for computer security educators.
ACM Journal of Educational Resources in Computing 6(4): (2006) |
| 18 | EE | Lance J. Hoffman,
Kim Lawson-Jenkins,
Jeremy J. Blum:
Trust beyond security: an expanded trust model.
Commun. ACM 49(7): 94-101 (2006) |
| 17 | EE | Timothy Rosenberg,
Lance J. Hoffman:
Taking Networks on the Road: Portable Solutions for Security Educators.
IEEE Security & Privacy 4(1): 57-60 (2006) |
| 2005 |
| 16 | EE | Lance J. Hoffman,
Timothy Rosenberg,
Ronald Dodge,
Daniel Ragsdale:
Exploring a National Cybersecurity Exercise for Universities.
IEEE Security & Privacy 3(5): 27-33 (2005) |
| 2004 |
| 15 | EE | Jeremy J. Blum,
Azim Eskandarian,
Lance J. Hoffman:
Challenges of intervehicle ad hoc networks.
IEEE Transactions on Intelligent Transportation Systems 5(4): 347-351 (2004) |
| 2003 |
| 14 | | Lance J. Hoffman,
Timothy Rosenberg,
Steve Willmore:
The Portable Educational Network (PEN).
IAW 2003: 217-220 |
| 2001 |
| 13 | EE | Lance J. Hoffman,
Lorrie Faith Cranor:
Internet voting for public officials: introduction.
Commun. ACM 44(1): 69-71 (2001) |
| 1999 |
| 12 | EE | Rachna Dhamija,
Rachelle S. Heller,
Lance J. Hoffman:
Teaching E-Commerce to a Multidisciplinary Class.
Commun. ACM 42(9): 50-55 (1999) |
| 1994 |
| 11 | | Paul C. Clark,
Lance J. Hoffman:
BITS: A Smartcard Protected Operating System.
Commun. ACM 37(11): 66-70 (1994) |
| 10 | | Lance J. Hoffman,
Faraz A. Ali,
Steven L. Heckler,
Ann Huybrechts:
Cryptography Policy.
Commun. ACM 37(9): 109-117 (1994) |
| 1993 |
| 9 | EE | John A. Fitch III,
Lance J. Hoffman:
A shortest path network security model.
Computers & Security 12(2): 169-189 (1993) |
| 1992 |
| 8 | | Lance J. Hoffman:
Reducing Society's Vulnerability as Computers and Networks Proliferate.
IFIP Congress (2) 1992: 554-563 |
| 1989 |
| 7 | EE | Lance J. Hoffman:
Risk analysis and computer security: Towards a theory at last.
Computers & Security 8(1): 23-24 (1989) |
| 6 | EE | Lance J. Hoffman:
Smoking out the bad actors: Risk analysis in the age of the microcomputer.
Computers & Security 8(4): 325-344 (1989) |
| 1982 |
| 5 | EE | Lance J. Hoffman:
Impacts of information system vulnerabilities on society.
AFIPS National Computer Conference 1982: 461-467 |
| 1980 |
| 4 | | Theodore D. Friedman,
Lance J. Hoffman:
Towards a Fail-Safe Approach to Secure Databases.
IEEE Symposium on Security and Privacy 1980: 18-21 |
| 1979 |
| 3 | EE | Lance J. Hoffman:
The application of networks in basic computer science and information science research.
Inf. Process. Manage. 15(6): 269-280 (1979) |
| 1974 |
| 2 | | Theodore D. Friedman,
Lance J. Hoffman:
Execution Time Requirements for Encipherment Programs.
Commun. ACM 17(8): 445-449 (1974) |
| 1969 |
| 1 | | Lance J. Hoffman:
Computers and Privacy: A Survey.
ACM Comput. Surv. 1(2): 85-103 (1969) |