Follow
Lance Hoffman
Lance Hoffman
Distinguished Research Professor of Computer Science, The George WashingtonUniversity
Verified email at email.gwu.edu - Homepage
Title
Cited by
Cited by
Year
Challenges of intervehicle ad hoc networks
JJ Blum, A Eskandarian, LJ Hoffman
IEEE transactions on intelligent transportation systems 5 (4), 347-351, 2004
8912004
Modern methods for computer security and privacy
LJ Hoffman
Prentice-Hall, 1977
2401977
Trust beyond security: an expanded trust model
LJ Hoffman, K Lawson-Jenkins, J Blum
Communications of the ACM 49 (7), 94-101, 2006
2112006
Mobility management in IVC networks
J Blum, A Eskandarian, L Hoffman
IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No. 03TH8683 …, 2003
1722003
Computers and privacy: A survey
LJ Hoffman
ACM Computing Surveys (CSUR) 1 (2), 85-103, 1969
1571969
BITS: a smartcard protected operating system
PC Clark, LJ Hoffman
Communications of the ACM 37 (11), 66-70, 1994
1431994
Exploring a national cybersecurity exercise for universities
LJ Hoffman, T Rosenberg, R Dodge, D Ragsdale
IEEE Security & Privacy 3 (5), 27-33, 2005
1222005
Getting a personal dossier from a statistical data bank
LJ Hoffman, WF Miller
Datamation 16 (5), 74-75, 1970
1221970
Rogue Programs: Viruses, Worms and Trojan Horses
LJ Hoffman
Van Nostrand Reinhold Co., 1990
1041990
Holistically building the cybersecurity workforce
L Hoffman, D Burley, C Toregas
IEEE Security & Privacy 10 (2), 33-39, 2011
1002011
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
732010
Security and privacy in computer systems
LJ Hoffman
(No Title), 1973
711973
Identification and retrieval of personal records from a statistical data bank
J Schlörer
Methods of information in medicine 14 (01), 7-13, 1975
621975
Computers and privacy in the next decade
LJ Hoffman
Academic Press, Inc., 1980
611980
The formulary model for flexible privacy and access controls
LJ Hoffman
Proceedings of the November 16-18, 1971, fall joint computer conference, 587-601, 1972
511972
Teaching e-commerce to a multidisciplinary class
R Dhamija, R Heller, LJ Hoffman
Communications of the ACM 42 (9), 50-55, 1999
491999
SECURATE-Security evaluation and analysis using fuzzy metrics.
LJ Hoffman, EH Michelman, D Clements
AFIPS National Computer Conference, 531-540, 1978
491978
Performance characteristics of inter-vehicle ad hoc networks
J Blum, A Eskandarian, LJ Hoffman
Proceedings of the 2003 IEEE International Conference on Intelligent …, 2003
432003
A survey of issues in computer network security
LS Rutledge, LJ Hoffman
Computers & Security 5 (4), 296-308, 1986
401986
Internet voting for public officials: introduction
LJ Hoffman, L Cranor
Communications of the ACM 44 (1), 69-71, 2001
392001
The system can't perform the operation now. Try again later.
Articles 1–20