[ Publications of year 1997 ]

Articles in journals or book chapters (1)
  1. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security. [bibtex-entry]

Conference publications (4)
  1. David A Evensky, Ann C Gentile, L. Jean Camp, and Robert C Armstrong. Lilith: Scalable execution of user code for distributed computing. In High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on, pages 305--314, August 1997. IEEE.
    Keywords: Network Engineering. [bibtex-entry]

  2. L. Jean Camp and D.A. Evensky. Survivability & Trust. In , pages 12--14, May 1997. Research Directions for the Next Generation Internet, Washington, DC.
    Keywords: Design for Trust, Network Engineering. [bibtex-entry]

  3. L. Jean Camp. Opportunities, Options, Obstacles for Payment in Internet Commerce. In EDI FORUM-OAK PARK-, volume 10, pages 19--32, 1997. THE EDI GROUP, LTD.. [bibtex-entry]

  4. L. Jean Camp and Donna M Riley. Bedrooms, Barrooms, and Boardrooms on the Interner. In Interconnection and the Internet: selected papers from the 1996 Telecommunications Policy Research Conference, pages 205, 1997. Lawrence Erlbaum.
    Keywords: Gender Online. [bibtex-entry]

Internal reports (1)
  1. RC Armstrong, L. Jean Camp, DA Evensky, and AC Gentile. Lilith: A scalable secure tool for massively parallel distributed computing. Technical report, Sandia National Labs., Albuquerque, NM (United States), 1997. [bibtex-entry]

Posters and Presentations (1)
  1. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Mon Nov 7 18:21:15 2022
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House