Challenges of intervehicle ad hoc networks JJ Blum, A Eskandarian, LJ Hoffman IEEE transactions on intelligent transportation systems 5 (4), 347-351, 2004 | 892 | 2004 |
Modern methods for computer security and privacy LJ Hoffman Prentice-Hall, 1977 | 240 | 1977 |
Trust beyond security: an expanded trust model LJ Hoffman, K Lawson-Jenkins, J Blum Communications of the ACM 49 (7), 94-101, 2006 | 211 | 2006 |
Mobility management in IVC networks J Blum, A Eskandarian, L Hoffman IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No. 03TH8683 …, 2003 | 172 | 2003 |
Computers and privacy: A survey LJ Hoffman ACM Computing Surveys (CSUR) 1 (2), 85-103, 1969 | 158 | 1969 |
BITS: a smartcard protected operating system PC Clark, LJ Hoffman Communications of the ACM 37 (11), 66-70, 1994 | 143 | 1994 |
Getting a personal dossier from a statistical data bank LJ Hoffman, WF Miller Datamation 16 (5), 74-75, 1970 | 123 | 1970 |
Exploring a national cybersecurity exercise for universities LJ Hoffman, T Rosenberg, R Dodge, D Ragsdale IEEE Security & Privacy 3 (5), 27-33, 2005 | 122 | 2005 |
Rogue Programs: Viruses, Worms and Trojan Horses LJ Hoffman Van Nostrand Reinhold Co., 1990 | 104 | 1990 |
Holistically building the cybersecurity workforce L Hoffman, D Burley, C Toregas IEEE Security & Privacy 10 (2), 33-39, 2011 | 101 | 2011 |
An exploration of the current state of information assurance education S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ... ACM SIGCSE Bulletin 41 (4), 109-125, 2010 | 73 | 2010 |
Security and privacy in computer systems LJ Hoffman (No Title), 1973 | 72 | 1973 |
Identification and retrieval of personal records from a statistical data bank J Schlörer Methods of information in medicine 14 (01), 7-13, 1975 | 63 | 1975 |
Computers and privacy in the next decade LJ Hoffman Academic Press, Inc., 1980 | 62 | 1980 |
The formulary model for flexible privacy and access controls LJ Hoffman Proceedings of the November 16-18, 1971, fall joint computer conference, 587-601, 1972 | 51 | 1972 |
Teaching e-commerce to a multidisciplinary class R Dhamija, R Heller, LJ Hoffman Communications of the ACM 42 (9), 50-55, 1999 | 50 | 1999 |
SECURATE-Security evaluation and analysis using fuzzy metrics. LJ Hoffman, EH Michelman, D Clements AFIPS National Computer Conference, 531-540, 1978 | 49 | 1978 |
Performance characteristics of inter-vehicle ad hoc networks J Blum, A Eskandarian, LJ Hoffman Proceedings of the 2003 IEEE International Conference on Intelligent …, 2003 | 43 | 2003 |
A survey of issues in computer network security LS Rutledge, LJ Hoffman Computers & Security 5 (4), 296-308, 1986 | 40 | 1986 |
Internet voting for public officials: introduction LJ Hoffman, L Cranor Communications of the ACM 44 (1), 69-71, 2001 | 39 | 2001 |