Follow
Susan Landau
Susan Landau
Tufts University
Verified email at privacyink.org
Title
Cited by
Cited by
Year
Privacy on the line: The politics of wiretapping and encryption
W Diffie, S Landau
The MIT Press, 2010
4002010
Keys under doormats: mandating insecurity by requiring government access to all data and communications
H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, ...
Journal of Cybersecurity 1 (1), 69-79, 2015
2142015
Making sense from Snowden: What's significant in the NSA surveillance revelations
S Landau
IEEE Security & Privacy 11 (4), 54-63, 2013
2072013
Untangling attribution
DD Clark, S Landau
Harv. Nat'l Sec. J. 2, 323, 2011
1732011
Factoring polynomials over algebraic number fields
S Landau
SIAM Journal on Computing 14 (1), 184-195, 1985
1671985
Solvability by radicals is in polynomial time
S Landau, GL Miller
Journal of Computer and System Sciences 30 (2), 179-208, 1985
1481985
Polynomial decomposition algorithms
D Kozen, S Landau
Journal of Symbolic Computation 7 (5), 445-456, 1989
1261989
Surveillance or security?: The risks posed by new wiretapping technologies
S Landau
Mit Press, 2011
1182011
The complexity of iterated multiplication
N Immerman, S Landau
Information and Computation 116 (1), 103-116, 1995
1061995
Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet
SM Bellovin, M Blaze, S Clark, S Landau
Nw. J. Tech. & Intell. Prop. 12, 1, 2014
862014
Highlights from making sense of Snowden, part II: What's significant in the NSA revelations
S Landau
IEEE Security & Privacy 12 (1), 62-64, 2014
842014
Privacy on the Line
W Diffie, SE Landau
811998
Control use of data to protect privacy
S Landau
Science 347 (6221), 504-506, 2015
792015
Standing the test of time: The data encryption standard
S Landau
Notices of the AMS 47 (3), 341-349, 2000
782000
Simplification of nested radicals
S Landau
SIAM Journal on Computing 21 (1), 85-110, 1992
621992
The problem isn't attribution: it's multi-stage attacks
DD Clark, S Landau
Proceedings of the Re-architecting the Internet Workshop, 1-6, 2010
562010
Economic tussles in federated identity management
S Landau, T Moore
First Monday, 2012
472012
Polynomials in the nation's service: Using algebra to design the advanced encryption standard
S Landau
The American Mathematical Monthly 111 (2), 89-117, 2004
452004
How to tangle with a nested radical
S Landau
The Mathematical Intelligencer 16 (2), 49-55, 1994
441994
Privacy and cybersecurity: The next 100 years
C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk
Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012
432012
The system can't perform the operation now. Try again later.
Articles 1–20