L Jean Camp
Title
Cited by
Cited by
Year
OpenFlow vulnerability assessment
K Benton, LJ Camp, C Small
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
3502013
Trust and risk in Internet commerce
LJ Camp
The MIT press, 2001
2132001
Mental models of privacy and security
LJ Camp
Technology and Society Magazine, IEEE 28 (3), 37-46, 2009
2032009
Mental models of security risks
F Asgharpour, D Liu, L Camp
Financial Cryptography and Data Security, 367-377, 2007
1902007
Mental models of security risks
F Asgharpour, D Liu, LJ Camp
International Conference on Financial Cryptography and Data Security, 367-377, 2007
1852007
Digital identity
JL Camp
IEEE Technology and Society Magazine 23 (3), 34-41, 2004
1542004
Anonymous certified delivery
LJ Camp, JD Tygar, MR Harkavy
US Patent 6,076,078, 2000
1522000
Privacy, Technology, and Aging: A Proposed Framework
L Lorenzen-Huber, M Boutain, LJ Camp, K Shankar, KH Connelly
Ageing International 36 (2), 232-252, 2011
1352011
Designing for trust
L Camp
Trust, Reputation, and Security: Theories and Practice, 203-209, 2003
1202003
Economics of information security
LJ Camp, S Lewis
Springer Science & Business Media, 2004
118*2004
Pricing security
LJ Camp, C Wolfram
Proceedings of the CERT Information Survivability Workshop, 31-39, 2000
1032000
Security and privacy in online social networking: Risk perceptions and precautionary behaviour
P van Schaik, J Jansen, J Onibokun, J Camp, P Kusev
Computers in Human Behavior 78, 283-297, 2018
912018
Token and Notational Money in Electronic Commerce.
LJ Camp, MA Sirbu, JD Tygar
Usenix Workshop on Electronic Commerce, 1995
851995
Token and notational money in electronic commerce
LJ Camp, M Sirbu, JD Tygar
Proceedings of the First USENIX Workshop in Electronic Commerce, 1-12, 1995
851995
Anonymous atomic transactions
J Camp, M Harkavy, JD Tygar, B Yee
CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE, 1996
821996
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home
KE Caine, CY Zimmerman, Z Schall-Zimmerman, WR Hazlewood, ...
Proceedings of the 1st ACM International Health Informatics Symposium, 153-162, 2010
79*2010
Economics of information security
LJ Camp, S Lewis
Springer, 2004
782004
We are geeks, and we are not guys: The systers mailing list
LJ Camp
Wired women: Gender and new realities in cyberspace, 114-125, 1996
771996
Game-theoretic modeling and analysis of insider threats
D Liu, XF Wang, J Camp
International Journal of Critical Infrastructure Protection 1, 75-80, 2008
762008
Web security and privacy: An American perspective
LJ Camp
The Information Society 15 (4), 249-256, 1999
761999
The system can't perform the operation now. Try again later.
Articles 1–20