[ Publications of year 2014 ]
Articles in journals or book chapters (6) |
-
Chris Hall,
Dongting Yu,
Zhi-li Zhang,
Jonathan Stout,
Andrew Odlyzko,
Andrew W Moore,
L. Jean Camp,
Kevin Benton,
and Ross Anderson.
Collaborating with the enemy on network management.
In Security Protocols XXII,
pages 154--162.
Springer International Publishing,
2014.
Keywords: Network Engineering.@InCollection{ hall2014collaborating,
title = {Collaborating with the enemy on network management},
url = {https://www.bsi.umn.edu/~odlyzko/doc/sdnsecurity2014.pdf},
author = {Hall, Chris and Yu, Dongting and Zhang, Zhi-li and Stout, Jonathan and Odlyzko, Andrew and Moore, Andrew W and Camp, L. Jean and Benton, Kevin and Anderson, Ross},
booktitle = {Security Protocols XXII},
pages = {154--162},
year = {2014},
keywords = "Network Engineering",
publisher = {Springer International Publishing} } -
Terry Davis,
Jon M Peha,
Eric Burger,
L. Jean Camp,
and Dan Lubar.
Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity.
Available at SSRN 2468604,
2014.
@Article{ davis2014risking,
title = {Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity},
author = {Davis, Terry and Peha, Jon M and Burger, Eric and Camp, L. Jean and Lubar, Dan},
journal = {Available at SSRN 2468604},
year = {2014} } -
Vaibhav Garg,
L. Jean Camp,
Lesa Lorenzen-Huber,
Kalpana Shankar,
and Kay Connelly.
Privacy concerns in assisted living technologies.
annals of telecommunications-annales des t?l?communications,
69(1-2):75--88,
2014.
Keywords: Aging.@Article{ garg2014privacy,
title = {Privacy concerns in assisted living technologies},
url = {http://ljean.com/files/Annals-of-Telecom-v5.pdf},
author = {Garg, Vaibhav and Camp, L. Jean and Lorenzen-Huber, Lesa and Shankar, Kalpana and Connelly, Kay},
journal = {annals of telecommunications-annales des t{\'e}l{\'e}communications},
volume = {69},
number = {1-2},
pages = {75--88},
keywords = "Aging",
year = {2014},
publisher = {Springer Paris} } -
Hilda Hadan.
On the Application of Two-Dimensional Code in Television Production and Broadcasting.
International Broadband Network,
2014.
@Article{ hhadan2014oct_qr,
title = {On the Application of Two-Dimensional Code in Television Production and Broadcasting},
author = {Hilda Hadan},
journal = {International Broadband Network},
year = {2014},
url = {http://ci.cqvip.com/Qikan/Article/Detail?id=662767939&from=Qikan_Search_Index} } -
Shrirang Mare,
Jacob Sorber,
Minho Shin,
Cory Cornelius,
and David Kotz.
Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth.
Mobile Networks and Applications (MONET),
19(3),
2014.
@Article{ mare14-hide-n-sense,
author = {Shrirang Mare and Jacob Sorber and Minho Shin and Cory Cornelius and David Kotz},
doi = {10.1007/s11036-013-0447-x},
entrysubtype = {None},
journal = {Mobile Networks and Applications (MONET)},
number = {3},
numpages = {14},
title = {Hide-n-{S}ense: Preserving Privacy Efficiently in Wireless {mH}ealth},
volume = {19},
year = {2014} } -
Martina Angela Sasse,
Charles C Palmer,
Markus Jakobsson,
Sunny Consolvo,
Rick Wash,
and L. Jean Camp.
Helping you protect you.
IEEE Security & Privacy,
12(1):39--42,
2014.
@Article{ sasse2014helping,
title = {Helping you protect you},
author = {Sasse, Martina Angela and Palmer, Charles C and Jakobsson, Markus and Consolvo, Sunny and Wash, Rick and Camp, L. Jean},
journal = {IEEE Security \& Privacy},
volume = {12},
number = {1},
pages = {39--42},
year = {2014} }
Conference publications (5) |
-
Shrirang Mare,
Andr?s Molina-Markham,
Cory Cornelius,
Ronald Peterson,
and David Kotz.
ZEBRA: Zero-Effort Bilateral Recurring Authentication.
In Proceedings of the IEEE Symposium on Security and Privacy (S{\&
}P),
May 2014.
Note: The project has been renamed SAW.
Keywords: referred.@InProceedings{ mare14-zebra,
author = {Shrirang Mare and Andr\'{e}s Molina-Markham and Cory Cornelius and Ronald Peterson and David Kotz},
booktitle = ieee-ssp,
doi = {10.1109/SP.2014.51},
entrysubtype = {None},
keywords = {referred},
month = may,
numpages = {16},
title = {{ZEBRA}: Zero-Effort Bilateral Recurring Authentication},
year = {2014},
note = {The project has been renamed SAW.} } -
Greg Norcie,
Jim Blythe,
Kelly Caine,
and L. Jean Camp.
Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems.
In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC),
February 2014.
Keywords: Human-Centered Security.@InProceedings{ norcie2014johnny,
title = {Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems},
url = {http://www.ljean.com/files/usecTor.pdf},
author = {Norcie, Greg and Blythe, Jim and Caine, Kelly and Camp, L. Jean},
booktitle = {Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC)},
keywords = "Human-Centered Security",
month = {February},
year = {2014} } -
Berkay Aydin,
Dustin Kempton,
Vijay Akkineni,
Shakthidhar Reddy Gopavaram,
Karthik Ganesan Pillai,
and Rafal Angryk.
Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns.
In 2014 IEEE international conference on big data (Big Data),
pages 1--10,
2014.
IEEE.
@InProceedings{ sgopavar2014spatiotemporal,
title = {Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns},
author = {Aydin, Berkay and Kempton, Dustin and Akkineni, Vijay and Gopavaram, Shakthidhar Reddy and Pillai, Karthik Ganesan and Angryk, Rafal},
booktitle = {2014 IEEE international conference on big data (Big Data)},
pages = {1--10},
year = {2014},
organization = {IEEE} } -
Zheng Dong,
Kevin Kane,
and L. Jean Camp.
Phishing in Smooth Waters: The State of Banking Certificates in the US.
In 2014 TPRC Conference Paper,
2014.
Keywords: Phishing, E-Crime.@InProceedings{ dong2014phishing,
title = {Phishing in Smooth Waters: The State of Banking Certificates in the US},
url = {http://www.ssrn.com/abstract=2407968},
author = {Dong, Zheng and Kane, Kevin and Camp, L. Jean},
booktitle = {2014 TPRC Conference Paper},
keywords = "Phishing, E-Crime",
year = {2014} } -
Vaibhav Garg,
Kevin Benton,
and L. Jean Camp.
The Privacy Paradox: A Facebook Case Study.
In 2014 Telecommunications Policy Research Conference (TPRC), Arlington VA,
2014.
Keywords: Mental Models, Human-Centered Security, Social Network Privacy, Aging.@InProceedings{ garg2014privacyparadox,
title = {The Privacy Paradox: A Facebook Case Study},
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2411672},
author = {Garg, Vaibhav and Benton, Kevin and Camp, L. Jean},
booktitle = {2014 Telecommunications Policy Research Conference (TPRC), Arlington VA},
keywords = {"Mental Models", "Human-Centered Security", "Social Network Privacy", "Aging"},
year = {2014} }
Internal reports (3) |
-
Shrirang Mare,
Andr?s Molina-Markham,
Cory Cornelius,
Ronald Peterson,
and David Kotz.
ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report).
Technical report TR2014-748,
Dartmouth Computer Science,
May 2014.
Note: This project has been renamed SAW.
Keywords: techreport.@TechReport{ mare14-zebra-tr,
author = {Shrirang Mare and Andr\'{e}s Molina-Markham and Cory Cornelius and Ronald Peterson and David Kotz},
entrysubtype = {None},
institution = {Dartmouth Computer Science},
keywords = {techreport},
month = {May},
note = {This project has been renamed SAW.},
number = {TR2014-748},
title = {{ZEBRA}: Zero-Effort Bilateral Recurring Authentication (Companion report)},
url = {http://www.cs.dartmouth.edu/reports/TR2014-748.pdf},
year = {2014} } -
Cory Cornelius,
Zachary Marois,
Jacob Sorber,
Ron Peterson,
Shrirang Mare,
and David Kotz.
Vocal resonance as a biometric for pervasive wearable devices.
Technical report TR2014-747,
Dartmouth Computer Science,
February 2014.
Keywords: authentication, security, sensors, wearable.@TechReport{ cornelius:voice-tr,
author = {Cory Cornelius and Zachary Marois and Jacob Sorber and Ron Peterson and Shrirang Mare and David Kotz},
entrysubtype = {None},
institution = {Dartmouth Computer Science},
keywords = {authentication,security, sensors, wearable},
month = {February},
number = {TR2014-747},
title = {{Vocal resonance as a biometric for pervasive wearable devices}},
url = {http://www.cs.dartmouth.edu/reports/TR2014-747.pdf},
year = {2014} } -
L. Jean Camp,
Ross Anderson,
Zhi-Lang Zhang,
Chris Hall,
Chris Small,
Tim Kelley,
and others.
Hardening Software Defined Networks.
Technical report,
INDIANA UNIV AT BLOOMINGTON,
2014.
@TechReport{ camp2014hardening,
title = {Hardening Software Defined Networks},
author = {Camp, L. Jean and Anderson, Ross and Zhang, Zhi-Lang and Hall, Chris and Small, Chris and Kelley, Tim and others},
year = {2014},
institution = {INDIANA UNIV AT BLOOMINGTON} }
Posters and Presentations (2) |
-
Jacob Abbott,
Violeta Moreno,
and L. Jean Camp.
Password Differences based on Language and Testing of Memory Recall.
Annual Computer Security Applications Conference, (New Oleans, LA),
December 2014.
Keywords: Passwords, Usability, User Study.@Misc{ abbott2014_poster,
title = "Password Differences based on Language and Testing of Memory Recall",
author = {Abbott, Jacob and Moreno, Violeta and Camp, L. Jean},
howpublished = {Annual Computer Security Applications Conference, (New Oleans, LA)},
month = {December},
year = {2014},
url = {http://ljean.com/files/ACSACLanguagePasswordDifference.pdf},
keywords = {Passwords, Usability, User Study} } -
Mart?n Abadi,
Hal Abelson,
Alessandro Acquisti,
Mihir Bellare,
Steven Bellovin,
Matt Blaze,
L. Jean Camp,
and Ran Canetti.
An open letter from US researchers in cryptography and information security,
2014.
@Misc{ abadi2014open,
title = {An open letter from US researchers in cryptography and information security},
author = {Abadi, Mart{\'\i}n and Abelson, Hal and Acquisti, Alessandro and Bellare, Mihir and Bellovin, Steven and Blaze, Matt and Camp, L. Jean and Canetti, Ran},
year = {2014} }
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House