• Kim Lawson-Jenkins, Lance J. Hoffman, How to Migrate to Internet Voting January 20, 2007. • Lance J. Hoffman, Making Every Vote Count: Security and Reliability of Computerized Vote-Counting Systems [http://www.seas.gwu.edu/~lanceh/making.pdf, (original Markle Foundation report), December 1987. • Lance J. Hoffman, Kim Lawson-Jenkins, and Jeremy Blum, Trust beyond security: an expanded trust model, Communications of the ACM, Vol. 49, No. 7, pp. 94–101, July 2006, #Timothy Rosenberg and Lance J. Hoffman, "Taking Networks on the Road: Portable Solutions for Security Educators", IEEE Security & Privacy, Vol. 4, No. 1, pp. 57–60, January–February 2006, [http://www.computer.org/portal/site/security/menuitem.6f7b2414551cb84651286b108bcd45f3/index.jsp?&pName=security_level1_article&TheCat=1001&path=security/2006/v4n1&file=edu.xml&. • Lance Hoffman, Cynthia Cicalese, Janine DeWitt, and Timothy Rosenberg, “An Integrated Approach to Computer Security Instruction Using Case Study Modules and a Portable Network Laboratory”, Proc. 4th World Information Security Education Conference, Moscow, May 2005. • Lance J. Hoffman, Tim Rosenberg, Ronald Dodge, and Daniel Ragsdale, "Exploring a National Cybersecurity Exercise for Universities", IEEE Security & Privacy, Vol. 3, No. 5, pp. 27–33, September–October 2005, #Paul C. Clark and Lance J. Hoffman, BITS: a smartcard protected operating system, Communications of the ACM, Vol. 37, No. 11, pp. 66–70, November 1994, [http://doi.acm.org/10.1145/188280.188371. • Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, and Ann Huybrechts, Cryptography policy, Communications of the ACM, Vol. 37, Issue 9, pp. 109–117, September 1994, #Rachna Dhamija, Rachelle Heller, Lance J. Hoffman, Teaching e-commerce to a multidisciplinary class, Communications of the ACM, Vol. 42, Issue 9, pp. 50–55, September 1999, [http://doi.acm.org/10.1145/315762.315771. • Lance J. Hoffman, Computers and Privacy: A Survey,
ACM Computing Surveys, Vol. 1, Issue 2, pp. 85–103, June 1969, . ==External links==