[ Publications of year 2012 ]

Articles in journals or book chapters (14)
  1. Alessandro Armando, Hilarie Orman, Terry Benzel, L. Jean Camp, Bruno Crispo, Grit Denker, Eduard Hovy, Alefiya Hussain, Daniela Oliveira, and Pierangela Samarati. WSCS 2012. 2012. [bibtex-entry]

  2. Jim Blyth, Sven Dietrich, and L. Jean Camp. Proceedings of the 16th international conference on Financial Cryptography and Data Security. Springer-Verlag, 2012. [bibtex-entry]

  3. L. Jean Camp and M Eric Johnson. Security and Privacy as Market Failures. The Economics of Financial and Medical Identity Theft, pp 53--60, 2012.
    Note: Springer US. [bibtex-entry]

  4. L. Jean Camp and M Eric Johnson. Identity Theft. The Economics of Financial and Medical Identity Theft, pp 17--30, 2012.
    Note: Springer US. [bibtex-entry]

  5. L. Jean Camp and M Eric Johnson. Defeating the Greatest Masquerade. The Economics of Financial and Medical Identity Theft, pp 31--39, 2012.
    Note: Springer US. [bibtex-entry]

  6. Vaibhav Garg and L. Jean Camp. End User Perception of Online Risk Under Uncertainty. Hawaii International Conference On System Sciences, (Manoa, HI), pp 13--16, January 2012.
    Keywords: Mental Models. [bibtex-entry]

  7. Vaibhav Garg and L. Jean Camp. Gandhigiri in cyberspace: a novel approach to information ethics. ACM SIGCAS Computers and Society, 42(1):9--20, 2012.
    Keywords: Internet Governance. [bibtex-entry]

  8. Vaibhav Garg, Chris Kanich, and L. Jean Camp. Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. at WEIS, 2012.
    Keywords: E-Crime. [bibtex-entry]

  9. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter. Proceedings of the 5th international conference on Trust and Trustworthy Computing. Springer-Verlag, 2012. [bibtex-entry]

  10. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography and Data Security, pp 102--112, 2012.
    Note: Springer Berlin/Heidelberg.
    Keywords: Insider Threat. [bibtex-entry]

  11. Greg Norcie, Kelly Caine, and L. Jean Camp. Torpid: Delay and Difficult in the Tor Bundle. 2012. [bibtex-entry]

  12. Andrew S Patrick and L. Jean Camp. Harm Mitigation from the Release of Personal Identity Information. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp 309-330, 2012.
    Note: Business Science Reference.
    Keywords: Privacy, Economics of Security. [bibtex-entry]

  13. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security. [bibtex-entry]

  14. K Shankar, L Huber, L. Jean Camp, K Caine, and K Connelly. Finding the older user in home-based computing studies. Gerontechnology, 11(2):305, 2012.
    Keywords: Aging. [bibtex-entry]

Conference publications (11)
  1. Zheng Dong, Vaibhav Garg, L. Jean Camp, and Apu Kapadia. Pools, clubs and security: designing for a party not a person. In Proceedings of the 2012 New Security Paradigms Workshop, pages 77--86, September 2012. ACM.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-entry]

  2. Zheng Dong and L. Jean Camp. Peersec: Towards peer production and crowdsourcing for enhanced security. In The 7th USENIX Workshop on Hot Topics in Security (HotSec), August 2012.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-entry]

  3. Vaibhav Garg, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. Risk communication design: video vs. text. In International Symposium on Privacy Enhancing Technologies Symposium, pages 279--298, July 2012. Springer Berlin Heidelberg.
    Keywords: Mental Models, Aging. [bibtex-entry]

  4. Jim Blythe and L. Jean Camp. Implementing Mental Models. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 86--90, May 2012. IEEE.
    Keywords: Mental Models. [bibtex-entry]

  5. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Passive Biometrics for Pervasive Wearable Devices (Poster paper). In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: authentication, security, sensors, wearable. [bibtex-entry]

  6. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mhealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable. [bibtex-entry]

  7. John F Duncan and L. Jean Camp. Conducting an Ethical Study of Web Traffic.. In CSET, 2012. [bibtex-entry]

  8. Vaibhav Garg and L. Jean Camp. End user perception of online risk under uncertainty. In System Science (HICSS), 2012 45th Hawaii International Conference on, pages 3278--3287, 2012. IEEE. [bibtex-entry]

  9. Timothy Kelley, L. Jean Camp, Suzanne Lien, and Douglas Stebila. Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences. In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, pages 47--54, 2012. ACM.
    Keywords: Economics of Security. [bibtex-entry]

  10. Greg Norcie, Kelly Caine, and L. Jean Camp. Eliminating Stop-Points in the Installation and Use of Anonymity Systems: a Usability Evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012. [bibtex-entry]

  11. Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Reddy Gopavaram, and Elisa Bertino. Demonstrating a lightweight data provenance for sensor networks. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 1022--1024, 2012. ACM. [bibtex-entry]

Posters and Presentations (3)
  1. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Springer, 2012. [bibtex-entry]

  2. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2012. [bibtex-entry]

  3. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Springer, 2012. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House