Follow
Lance Hoffman
Lance Hoffman
Distinguished Research Professor of Computer Science, The George WashingtonUniversity
Verified email at email.gwu.edu - Homepage
Title
Cited by
Cited by
Year
Challenges of intervehicle ad hoc networks
JJ Blum, A Eskandarian, LJ Hoffman
IEEE transactions on intelligent transportation systems 5 (4), 347-351, 2004
8742004
Modern methods for computer security and privacy
LJ Hoffman
Prentice-Hall, 1977
2241977
Trust beyond security: an expanded trust model
LJ Hoffman, K Lawson-Jenkins, J Blum
Communications of the ACM 49 (7), 94-101, 2006
1952006
Mobility management in IVC networks
J Blum, A Eskandarian, L Hoffman
IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No. 03TH8683 …, 2003
1652003
Computers and privacy: A survey
LJ Hoffman
ACM Computing Surveys (CSUR) 1 (2), 85-103, 1969
1481969
BITS: a smartcard protected operating system
PC Clark, LJ Hoffman
Communications of the ACM 37 (11), 66-70, 1994
1451994
Getting a personal dossier from a statistical data bank
LJ Hoffman, WF Miller
Datamation 16 (5), 74-75, 1970
1171970
Exploring a national cybersecurity exercise for universities
LJ Hoffman, T Rosenberg, R Dodge, D Ragsdale
IEEE Security & Privacy 3 (5), 27-33, 2005
1162005
Rogue Programs: Viruses, Worms and Trojan Horses
LJ Hoffman
Van Nostrand Reinhold Co., 1990
991990
Holistically building the cybersecurity workforce
L Hoffman, D Burley, C Toregas
IEEE Security & Privacy 10 (2), 33-39, 2011
752011
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
702010
Security and privacy in computer systems
LJ Hoffman
John Wiley & Sons, 1973
681973
Computers and privacy in the next decade
LJ Hoffman
Academic Press, Inc., 1980
571980
The formulary model for flexible privacy and access controls
LJ Hoffman
Proceedings of the November 16-18, 1971, fall joint computer conference, 587-601, 1972
571972
Teaching e-commerce to a multidisciplinary class
R Dhamija, R Heller, LJ Hoffman
Communications of the ACM 42 (9), 50-55, 1999
491999
SECURATE-Security evaluation and analysis using fuzzy metrics.
LJ Hoffman, EH Michelman, D Clements
AFIPS National Computer Conference, 531-540, 1978
491978
Performance characteristics of inter-vehicle ad hoc networks
J Blum, A Eskandarian, LJ Hoffman
Proceedings of the 2003 IEEE International Conference on Intelligent …, 2003
432003
A survey of issues in computer network security
LS Rutledge, LJ Hoffman
Computers & Security 5 (4), 296-308, 1986
371986
Internet voting for public officials: introduction
LJ Hoffman, L Cranor
Communications of the ACM 44 (1), 69-71, 2001
362001
Building privacy into the semantic web: An ontology needed now
A Kim, LJ Hoffman, CD Martin
Proc. of semantic web workshop, hawaii, usa, 2002
332002
The system can't perform the operation now. Try again later.
Articles 1–20