Follow
Lance Hoffman
Lance Hoffman
Distinguished Research Professor of Computer Science, The George WashingtonUniversity
Verified email at email.gwu.edu - Homepage
Title
Cited by
Cited by
Year
Challenges of intervehicle ad hoc networks
JJ Blum, A Eskandarian, LJ Hoffman
IEEE transactions on intelligent transportation systems 5 (4), 347-351, 2004
8932004
Modern methods for computer security and privacy
LJ Hoffman
Prentice-Hall, 1977
2381977
Trust beyond security: an expanded trust model
LJ Hoffman, K Lawson-Jenkins, J Blum
Communications of the ACM 49 (7), 94-101, 2006
2182006
Mobility management in IVC networks
J Blum, A Eskandarian, L Hoffman
IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No. 03TH8683 …, 2003
1742003
Computers and privacy: A survey
LJ Hoffman
ACM Computing Surveys (CSUR) 1 (2), 85-103, 1969
1591969
BITS: a smartcard protected operating system
PC Clark, LJ Hoffman
Communications of the ACM 37 (11), 66-70, 1994
1431994
Exploring a national cybersecurity exercise for universities
LJ Hoffman, T Rosenberg, R Dodge, D Ragsdale
IEEE Security & Privacy 3 (5), 27-33, 2005
1242005
Getting a personal dossier from a statistical data bank
LJ Hoffman, WF Miller
Datamation 16 (5), 74-75, 1970
1211970
Rogue Programs: Viruses, Worms and Trojan Horses
LJ Hoffman
Van Nostrand Reinhold Co., 1990
1041990
Holistically building the cybersecurity workforce
L Hoffman, D Burley, C Toregas
IEEE Security & Privacy 10 (2), 33-39, 2011
1032011
Security and privacy in computer systems
LJ Hoffman
(No Title), 1973
751973
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
742010
Computers and privacy in the next decade
LJ Hoffman
Academic Press, Inc., 1980
621980
Identification and retrieval of personal records from a statistical data bank
J Schlörer
Methods of information in medicine 14 (01), 7-13, 1975
621975
The formulary model for flexible privacy and access controls
LJ Hoffman
Proceedings of the November 16-18, 1971, fall joint computer conference, 587-601, 1972
501972
Teaching e-commerce to a multidisciplinary class
R Dhamija, R Heller, LJ Hoffman
Communications of the ACM 42 (9), 50-55, 1999
491999
SECURATE-Security evaluation and analysis using fuzzy metrics.
LJ Hoffman, EH Michelman, D Clements
AFIPS National Computer Conference, 531-540, 1978
471978
Performance characteristics of inter-vehicle ad hoc networks
J Blum, A Eskandarian, LJ Hoffman
Proceedings of the 2003 IEEE International Conference on Intelligent …, 2003
432003
A survey of issues in computer network security
LS Rutledge, LJ Hoffman
Computers & Security 5 (4), 296-308, 1986
411986
Internet voting for public officials: introduction
LJ Hoffman, L Cranor
Communications of the ACM 44 (1), 69-71, 2001
392001
The system can't perform the operation now. Try again later.
Articles 1–20