[ Publications of year 1994 ]
Articles in journals or book chapters (4) |
-
L. Jean Camp.
Privacy: from abstraction to applications.
ACM SIGCAS Computers and Society,
24(3):8--15,
September 1994.
Keywords: Human-Centered Security.@Article{ camp1994privacy,
title = {Privacy: from abstraction to applications},
author = {Camp, L. Jean},
journal = {ACM SIGCAS Computers and Society},
volume = {24},
number = {3},
pages = {8--15},
keywords = "Human-Centered Security",
month = {September},
year = {1994},
publisher = {ACM} } -
L. Jean Camp and JD Tygar.
Providing auditing while protecting privacy.
The Information Society,
10(1):59--71,
March 1994.
Keywords: Human-Centered Security.@Article{ camp1994providing,
title = {Providing auditing while protecting privacy},
url = {http://www.ljean.com/files/counting.html},
author = {Camp, L. Jean and Tygar, JD},
journal = {The Information Society},
volume = {10},
number = {1},
pages = {59--71},
keywords = "Human-Centered Security",
month = {March},
year = {1994},
publisher = {Taylor \& Francis} } -
L. Jean Camp.
Cryptography policy needs another look.
IEEE Spectrum,
31(6):15--16,
1994.
Note: IEEE Press.@Article{ camp1994cryptography,
title = {Cryptography policy needs another look},
author = {Camp, L. Jean},
journal = {IEEE Spectrum},
volume = {31},
number = {6},
pages = {15--16},
year = {1994},
note = {IEEE Press} } -
L. Jean Camp,
Rohini Sharma,
and Michael R Feldman.
Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison.
Applied optics,
33(26):6168--6180,
1994.
Note: Optical Society of America.@Article{ camp1994guided,
title = {Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison},
author = {Camp, L. Jean and Sharma, Rohini and Feldman, Michael R},
journal = {Applied optics},
volume = {33},
number = {26},
pages = {6168--6180},
year = {1994},
note = {Optical Society of America} }
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House