[ Internal reports ]

2015 (1)
  1. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, 2015. [bibtex-entry]

2014 (3)
  1. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report). Technical report TR2014-748, Dartmouth Computer Science, May 2014.
    Note: This project has been renamed SAW.
    Keywords: techreport. [bibtex-entry]

  2. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Vocal resonance as a biometric for pervasive wearable devices. Technical report TR2014-747, Dartmouth Computer Science, February 2014.
    Keywords: authentication, security, sensors, wearable. [bibtex-entry]

  3. L. Jean Camp, Ross Anderson, Zhi-Lang Zhang, Chris Hall, Chris Small, Tim Kelley, and others. Hardening Software Defined Networks. Technical report, INDIANA UNIV AT BLOOMINGTON, 2014. [bibtex-entry]

2011 (1)
  1. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, mhealth, privacy, security, wearable, wifi. [bibtex-entry]

1997 (1)
  1. RC Armstrong, L. Jean Camp, DA Evensky, and AC Gentile. Lilith: A scalable secure tool for massively parallel distributed computing. Technical report, Sandia National Labs., Albuquerque, NM (United States), 1997. [bibtex-entry]

1996 (1)
  1. L. Jean Camp. Anonymous atomic transactions. Technical report, DTIC Document, 1996. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House