default search action
Susan Landau 0001
Person information
- affiliation: Tufts University, Boston, MA, USA
- affiliation (former): Worcester Polytechnic Institute, Department of Social Science and Policy Studies, MA, USA
- affiliation (former): Sun Microsystem Laboratories, Burlington, MA, USA
- affiliation (former): University of Massachusetts Amherst, Computer Science Department, MA, USA
- affiliation (former): Wesleyan University Middletown, Mathematics Department, CT, USA
- affiliation (PhD 1983): Massachusetts Institute of Technology, Cambridge, MA, USA
- award (2008): Anita Borg Institute Women of Vision Awards
Other persons with the same name
- Susan Landau 0002 — Department of Physics, Irvine, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [i3]Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin:
Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals. CoRR abs/2403.01649 (2024) - [i2]Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin, Robert Pool:
Challenging the Machine: Contestability in Government AI Systems. CoRR abs/2406.10430 (2024) - 2023
- [c19]Denise L. Anthony, Carl A. Gunter, Weijia He, Mounib Khanafer, Susan Landau, Ravindra Mangar, Nathan Reitinger:
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson. WPES@CCS 2023: 129-134 - 2022
- [p1]Susan Landau:
The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy. Democratizing Cryptography 2022: 213-256 - 2021
- [c18]Susan Landau:
Susan Landau, Tufts University. USENIX Security Symposium 2021 - [i1]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [c17]Susan Landau:
Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy. NSPW 2020: 1-19
2010 – 2019
- 2018
- [j48]Mark Guzdial, Susan Landau:
Programming programming languages, and analyzing Facebook's failure. Commun. ACM 61(6): 8-9 (2018) - [c16]Susan Landau:
The Second Crypto War - What's Different Now. USENIX Security Symposium 2018 - 2017
- [j47]Steven M. Bellovin, Susan Landau, Herbert S. Lin:
Limiting the undesired impact of cyber weapons: technical requirements and policy implications. J. Cybersecur. 3(1): 59-68 (2017) - 2016
- [j46]Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. Computer 49(3): 14-24 (2016) - [j45]Susan Landau:
Is It Legal? Is It Right? The Can and Should of Use. IEEE Secur. Priv. 14(5): 3-5 (2016) - [j44]Susan Landau:
Transactional information is remarkably revelatory. Proc. Natl. Acad. Sci. USA 113(20): 5467-5469 (2016) - 2015
- [j43]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j42]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j41]Susan Landau:
What Was Samsung Thinking? IEEE Secur. Priv. 13(3): 3-4 (2015) - [c15]Susan Landau:
Mining the Metadata - and Its Consequences. ICSE (1) 2015: 4-5 - 2014
- [j40]Susan Landau:
Summing up. Commun. ACM 57(11): 37-39 (2014) - [j39]Susan Landau:
Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations. IEEE Secur. Priv. 12(1): 62-64 (2014) - [j38]Susan Landau:
Security and Privacy: Facing Ethical Choices. IEEE Secur. Priv. 12(4): 3-6 (2014) - 2013
- [j37]Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau:
Going Bright: Wiretapping without Weakening Communications Infrastructure. IEEE Secur. Priv. 11(1): 62-72 (2013) - [j36]Susan Landau:
Politics, Love, and Death in a World of No Privacy. IEEE Secur. Priv. 11(3): 11-13 (2013) - [j35]Susan Landau:
Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations. IEEE Secur. Priv. 11(4): 54-63 (2013) - [j34]Susan Landau:
The Large Immortal Machine and the Ticking Time Bomb. J. Telecommun. High Technol. Law 11(1): 1-44 (2013) - 2012
- [j33]Susan Landau, Tyler Moore:
Economic tussles in federated identity management. First Monday 17(10) (2012) - [j32]Ann Cavoukian, Alan Davidson, Ed Felton, Marit Hansen, Susan Landau, Anna Slomovic:
Privacy: Front and Center. IEEE Secur. Priv. 10(5): 10-15 (2012) - [j31]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - [c14]Susan Landau:
Timesharing Dexter. Logic and Program Semantics 2012: 329-332 - 2011
- [b2]Susan Landau:
Surveillance Or Security? The Risks Posed by New Wiretapping Technologies. MIT Press 2011, ISBN 9780262015301 - [j30]Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford:
As simple as possible - but not more so. Commun. ACM 54(8): 30-33 (2011) - [c13]Susan Landau:
A computer scientist goes to washington: how to be effective in a world where facts are 10% of the equation. SIGCSE 2011: 237-238 - [c12]Susan Landau, Tyler Moore:
Economic Tussles in Federated Identity Management. WEIS 2011 - 2010
- [c11]David D. Clark, Susan Landau:
The problem isn't attribution: it's multi-stage attacks. ReArch@CoNEXT 2010: 11:1-11:6
2000 – 2009
- 2009
- [j29]Whitfield Diffie, Susan Landau:
Communications surveillance: privacy and security at risk. Commun. ACM 52(11): 42-47 (2009) - [j28]Susan Landau:
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy. IEEE Secur. Priv. 7(1): 58-62 (2009) - [j27]Whitfield Diffie, Susan Landau:
Communications Surveillance: Privacy and Security at Risk. ACM Queue 7(8): 10 (2009) - [c10]Susan Landau, Hubert Lê Van Gông, Robin Wilton:
Achieving Privacy in a Federated Identity Management System. Financial Cryptography 2009: 51-70 - 2008
- [j26]Susan Landau:
Privacy and security: A multidimensional problem. Commun. ACM 51(11): 25-26 (2008) - [j25]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford:
Risking Communications Security: Potential Hazards of the Protect America Act. IEEE Secur. Priv. 6(1): 24-33 (2008) - [j24]Susan Landau, Deirdre K. Mulligan:
I'm Pc01002/SpringPeeper/ED288l.6; Who are You? IEEE Secur. Priv. 6(2): 13-15 (2008) - [j23]Susan Landau:
Security and Privacy Landscape in Emerging Technologies. IEEE Secur. Priv. 6(4): 74-77 (2008) - [j22]Whitfield Diffie, Susan Landau:
Privacy on the line: the politics of wiretapping and encryption. SIGACT News 39(4): 30-32 (2008) - 2007
- [b1]Whitfield Diffie, Susan Landau:
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.). MIT Press 2007, ISBN 978-0-262-04240-6, pp. I-XVII, 1-472 - [j21]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) - 2006
- [j20]Susan Landau:
National Security on the Line. J. Telecommun. High Technol. Law 4(2): 409-448 (2006) - [c9]Susan Landau, Renée Stratulate, Doug Twilleager:
Consumers, fans, and control: what the games industry can teach Hollywood about DRM. Digital Rights Management Workshop 2006: 1-8 - 2005
- [j19]Susan Landau:
What lessons are we teaching? Commun. ACM 48(6): 144 (2005) - [j18]Steven M. Bellovin, Matt Blaze, Susan Landau:
The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005) - [j17]Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization. IEEE Secur. Priv. 3(3): 9-11 (2005) - [j16]Susan Landau:
Security, Wiretapping, and the Internet. IEEE Secur. Priv. 3(6): 26-33 (2005) - 2004
- [j15]Susan Landau:
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard. Am. Math. Mon. 111(2): 89-117 (2004) - [c8]Susan Landau:
Security, Liberty, and Electronic Communications. CRYPTO 2004: 355-372 - 2002
- [j14]Susan Landau, Neil Immerman:
Embedding Linkages on an Integer Lattice. Algorithmica 32(3): 423-436 (2002) - 2000
- [j13]Susan Landau:
Designing Cryptography for the New Century. Commun. ACM 43(5): 115-120 (2000)
1990 – 1999
- 1996
- [j12]Dexter Kozen, Susan Landau, Richard Zippel:
Decomposition of Algebraic Functions. J. Symb. Comput. 22(3): 235-246 (1996) - 1995
- [j11]Neil Immerman, Susan Landau:
The Complexity of Iterated Multiplication. Inf. Comput. 116(1): 103-116 (1995) - 1994
- [j10]Susan Landau, Stephen T. Kent, Clinton Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel:
Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994) - [c7]Dexter Kozen, Susan Landau, Richard Zippel:
Decomposition of algebraic functions. ANTS 1994: 80-92 - 1993
- [j9]Susan Landau:
Finding maximal subfields. SIGSAM Bull. 27(3): 4-8 (1993) - 1992
- [j8]Susan Landau:
A Note on "Zippel Denesting". J. Symb. Comput. 13(1): 41-46 (1992) - [j7]Susan Landau:
Simplification of Nested Radicals. SIAM J. Comput. 21(1): 85-110 (1992) - 1991
- [j6]Susan Landau:
Erratum: Factoring Polynomials Over Algebraic Number Fields. SIAM J. Comput. 20(5): 998 (1991) - 1990
- [j5]John Cremona, Susan Landau:
Shrinking Lattice Polyhedra. SIAM J. Discret. Math. 3(3): 338-348 (1990) - [c6]John Cremona, Susan Landau:
Shrinking Lattice Polyhedra. SODA 1990: 188-193
1980 – 1989
- 1989
- [j4]Dexter Kozen, Susan Landau:
Polynomial Decomposition Algorithms. J. Symb. Comput. 7(5): 445-456 (1989) - [c5]Neil Immerman, Susan Landau:
The Complexity of Iterated Multiplication. SCT 1989: 104-111 - [c4]Susan Landau:
Simplification of Nested Radicals. FOCS 1989: 314-319 - 1988
- [j3]Susan Landau:
Some Remarks on Computing the Square Parts of Integers. Inf. Comput. 78(3): 246-253 (1988) - 1987
- [c3]Joachim von zur Gathen, Dexter Kozen, Susan Landau:
Functional Decomposition of Polynomials. FOCS 1987: 127-131 - 1985
- [j2]Susan Landau, Gary L. Miller:
Solvability by Radicals is in Polynomial Time. J. Comput. Syst. Sci. 30(2): 179-208 (1985) - [j1]Susan Landau:
Factoring Polynomials Over Algebraic Number Fields. SIAM J. Comput. 14(1): 184-195 (1985) - 1984
- [c2]Susan Landau:
Polynomial Time Algorithms for Galois Groups. EUROSAM 1984: 225-236 - 1983
- [c1]Susan Landau, Gary L. Miller:
Solvability by Radicals is in Polynomial Time. STOC 1983: 140-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint