The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lance J. Hoffman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Theodore D. Friedman, Lance J. Hoffman
    Execution Time Requirements for Encipherment Programs. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1974, v:17, n:8, pp:445-449 [Journal]
  2. Lance J. Hoffman
    Computers and Privacy: A Survey. [Citation Graph (2, 0)][DBLP]
    ACM Comput. Surv., 1969, v:1, n:2, pp:85-103 [Journal]
  3. Theodore D. Friedman, Lance J. Hoffman
    Towards a Fail-Safe Approach to Secure Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:18-21 [Conf]
  4. Lance J. Hoffman, Timothy Rosenberg, Steve Willmore
    The Portable Educational Network (PEN). [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:217-220 [Conf]
  5. Lance J. Hoffman
    Reducing Society's Vulnerability as Computers and Networks Proliferate. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:554-563 [Conf]
  6. Paul C. Clark, Lance J. Hoffman
    BITS: A Smartcard Protected Operating System. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:11, pp:66-70 [Journal]
  7. Rachna Dhamija, Rachelle S. Heller, Lance J. Hoffman
    Teaching E-Commerce to a Multidisciplinary Class. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:9, pp:50-55 [Journal]
  8. Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts
    Cryptography Policy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:9, pp:109-117 [Journal]
  9. Lance J. Hoffman, Lorrie Faith Cranor
    Internet voting for public officials: introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:1, pp:69-71 [Journal]
  10. Lance J. Hoffman, Kim Lawson-Jenkins, Jeremy Blum
    Trust beyond security: an expanded trust model. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:7, pp:94-101 [Journal]
  11. John A. Fitch III, Lance J. Hoffman
    A shortest path network security model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:2, pp:169-189 [Journal]
  12. Lance J. Hoffman, Timothy Rosenberg, Ronald Dodge, Daniel Ragsdale
    Exploring a National Cybersecurity Exercise for Universities. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:27-33 [Journal]
  13. Timothy Rosenberg, Lance J. Hoffman
    Taking Networks on the Road: Portable Solutions for Security Educators. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:57-60 [Journal]
  14. Lance J. Hoffman
    The application of networks in basic computer science and information science research. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1979, v:15, n:6, pp:269-280 [Journal]
  15. Timothy Rosenberg, Lance J. Hoffman
    Taking the network on the road: Portable network solutions for computer security educators. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2006, v:6, n:4, pp:- [Journal]

  16. Impacts of information system vulnerabilities on society. [Citation Graph (, )][DBLP]


  17. Research in data security: policies and projects. [Citation Graph (, )][DBLP]


  18. Smoking out the bad actors: Risk analysis in the age of the microcomputer. [Citation Graph (, )][DBLP]


  19. Risk analysis and computer security: Towards a theory at last. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002