Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Susan Landau 0001
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our pockets: the risks of client-side scanning}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyad020}, doi = {10.1093/CYBSEC/TYAD020}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-01649, author = {Susan Landau and James X. Dempsey and Ece Kamar and Steven M. Bellovin}, title = {Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals}, journal = {CoRR}, volume = {abs/2403.01649}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01649}, doi = {10.48550/ARXIV.2403.01649}, eprinttype = {arXiv}, eprint = {2403.01649}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/AnthonyGHKLMR23, author = {Denise L. Anthony and Carl A. Gunter and Weijia He and Mounib Khanafer and Susan Landau and Ravindra Mangar and Nathan Reitinger}, editor = {Bart P. Knijnenburg and Panos Papadimitratos}, title = {The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson}, booktitle = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society, {WPES} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {129--134}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603216.3624956}, doi = {10.1145/3603216.3624956}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/AnthonyGHKLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/22/000122, author = {Susan Landau}, editor = {Rebecca Slayton}, title = {The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy}, booktitle = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman}, series = {{ACM} Books}, volume = {42}, pages = {213--256}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549993.3550002}, doi = {10.1145/3549993.3550002}, timestamp = {Thu, 21 Sep 2023 15:19:45 +0200}, biburl = {https://dblp.org/rec/books/acm/22/000122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/000121, author = {Susan Landau}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Susan Landau, Tufts University}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/keynote-landau}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/000121.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07450, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our Pockets: The Risks of Client-Side Scanning}, journal = {CoRR}, volume = {abs/2110.07450}, year = {2021}, url = {https://arxiv.org/abs/2110.07450}, eprinttype = {arXiv}, eprint = {2110.07450}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/000120, author = {Susan Landau}, title = {Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy}, booktitle = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020}, pages = {1--19}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442167.3442171}, doi = {10.1145/3442167.3442171}, timestamp = {Fri, 05 Feb 2021 14:28:57 +0100}, biburl = {https://dblp.org/rec/conf/nspw/000120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GuzdialL18, author = {Mark Guzdial and Susan Landau}, title = {Programming programming languages, and analyzing Facebook's failure}, journal = {Commun. {ACM}}, volume = {61}, number = {6}, pages = {8--9}, year = {2018}, url = {https://doi.org/10.1145/3204443}, doi = {10.1145/3204443}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/GuzdialL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Landau18, author = {Susan Landau}, editor = {William Enck and Adrienne Porter Felt}, title = {The Second Crypto War - What's Different Now}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/landau}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/Landau18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/BellovinLL17, author = {Steven M. Bellovin and Susan Landau and Herbert S. Lin}, title = {Limiting the undesired impact of cyber weapons: technical requirements and policy implications}, journal = {J. Cybersecur.}, volume = {3}, number = {1}, pages = {59--68}, year = {2017}, url = {https://doi.org/10.1093/cybsec/tyx001}, doi = {10.1093/CYBSEC/TYX001}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BellovinLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BellovinB016, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {Insecure Surveillance: Technical Issues with Remote Computer Searches}, journal = {Computer}, volume = {49}, number = {3}, pages = {14--24}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.68}, doi = {10.1109/MC.2016.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BellovinB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau16, author = {Susan Landau}, title = {Is It Legal? Is It Right? The Can and Should of Use}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {5}, pages = {3--5}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.105}, doi = {10.1109/MSP.2016.105}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pnas/000116, author = {Susan Landau}, title = {Transactional information is remarkably revelatory}, journal = {Proc. Natl. Acad. Sci. {USA}}, volume = {113}, number = {20}, pages = {5467--5469}, year = {2016}, url = {https://doi.org/10.1073/pnas.1605356113}, doi = {10.1073/PNAS.1605356113}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pnas/000116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AbelsonABBBDGGL15, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats}, journal = {Commun. {ACM}}, volume = {58}, number = {10}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1145/2814825}, doi = {10.1145/2814825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau15, author = {Susan Landau}, title = {What Was Samsung Thinking?}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {3--4}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.63}, doi = {10.1109/MSP.2015.63}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Landau15, author = {Susan Landau}, editor = {Antonia Bertolino and Gerardo Canfora and Sebastian G. Elbaum}, title = {Mining the Metadata - and Its Consequences}, booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1}, pages = {4--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSE.2015.23}, doi = {10.1109/ICSE.2015.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Landau15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Landau14, author = {Susan Landau}, title = {Summing up}, journal = {Commun. {ACM}}, volume = {57}, number = {11}, pages = {37--39}, year = {2014}, url = {https://doi.org/10.1145/2668901}, doi = {10.1145/2668901}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Landau14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau14, author = {Susan Landau}, title = {Highlights from Making Sense of Snowden, Part {II:} What's Significant in the {NSA} Revelations}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {62--64}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.161}, doi = {10.1109/MSP.2013.161}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau14b, author = {Susan Landau}, title = {Security and Privacy: Facing Ethical Choices}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {3--6}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.75}, doi = {10.1109/MSP.2014.75}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBCL13, author = {Steven M. Bellovin and Matt Blaze and Sandy Clark and Susan Landau}, title = {Going Bright: Wiretapping without Weakening Communications Infrastructure}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {62--72}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.138}, doi = {10.1109/MSP.2012.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau13, author = {Susan Landau}, title = {Politics, Love, and Death in a World of No Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {3}, pages = {11--13}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.65}, doi = {10.1109/MSP.2013.65}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau13a, author = {Susan Landau}, title = {Making Sense from Snowden: What's Significant in the {NSA} Surveillance Revelations}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {4}, pages = {54--63}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.90}, doi = {10.1109/MSP.2013.90}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Landau13, author = {Susan Landau}, title = {The Large Immortal Machine and the Ticking Time Bomb}, journal = {J. Telecommun. High Technol. Law}, volume = {11}, number = {1}, pages = {1--44}, year = {2013}, url = {http://www.jthtl.org/content/articles/V11I1/JTHTLv11i1\_Landau.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Landau13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/LandauM12, author = {Susan Landau and Tyler Moore}, title = {Economic tussles in federated identity management}, journal = {First Monday}, volume = {17}, number = {10}, year = {2012}, url = {https://doi.org/10.5210/fm.v17i10.4254}, doi = {10.5210/FM.V17I10.4254}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/LandauM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CavoukianDFHLS12, author = {Ann Cavoukian and Alan Davidson and Ed Felton and Marit Hansen and Susan Landau and Anna Slomovic}, title = {Privacy: Front and Center}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {10--15}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.123}, doi = {10.1109/MSP.2012.123}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CavoukianDFHLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LandwehrBMBLL12, author = {Carl E. Landwehr and Dan Boneh and John C. Mitchell and Steven M. Bellovin and Susan Landau and Michael E. Lesk}, title = {Privacy and Cybersecurity: The Next 100 Years}, journal = {Proc. {IEEE}}, volume = {100}, number = {Centennial-Issue}, pages = {1659--1673}, year = {2012}, url = {https://doi.org/10.1109/JPROC.2012.2189794}, doi = {10.1109/JPROC.2012.2189794}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Landau12, author = {Susan Landau}, editor = {Robert L. Constable and Alexandra Silva}, title = {Timesharing Dexter}, booktitle = {Logic and Program Semantics - Essays Dedicated to Dexter Kozen on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7230}, pages = {329--332}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29485-3\_26}, doi = {10.1007/978-3-642-29485-3\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Landau12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/mit/Landau2011, author = {Susan Landau}, title = {Surveillance Or Security? The Risks Posed by New Wiretapping Technologies}, publisher = {{MIT} Press}, year = {2011}, url = {http://mitpress.mit.edu/books/surveillance-or-security}, isbn = {9780262015301}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/mit/Landau2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLR11, author = {Steven M. Bellovin and Scott O. Bradner and Whitfield Diffie and Susan Landau and Jennifer Rexford}, title = {As simple as possible - but not more so}, journal = {Commun. {ACM}}, volume = {54}, number = {8}, pages = {30--33}, year = {2011}, url = {https://doi.org/10.1145/1978542.1978553}, doi = {10.1145/1978542.1978553}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/Landau11, author = {Susan Landau}, editor = {Thomas J. Cortina and Ellen Lowenfeld Walker and Laurie A. Smith King and David R. Musicant}, title = {A computer scientist goes to washington: how to be effective in a world where facts are 10{\%} of the equation}, booktitle = {Proceedings of the 42nd {ACM} technical symposium on Computer science education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011}, pages = {237--238}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1953163.1953233}, doi = {10.1145/1953163.1953233}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/Landau11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/LandauM11, author = {Susan Landau and Tyler Moore}, title = {Economic Tussles in Federated Identity Management}, booktitle = {10th Annual Workshop on the Economics of Information Security, {WEIS} 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011}, year = {2011}, url = {http://weis2011.econinfosec.org/papers/Economic\%20Tussles\%20in\%20Federated\%20Identity\%20Management.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:44 +0200}, biburl = {https://dblp.org/rec/conf/weis/LandauM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Clark010, author = {David D. Clark and Susan Landau}, editor = {Bob Briscoe and Peter Steenkiste}, title = {The problem isn't attribution: it's multi-stage attacks}, booktitle = {Proceedings of the Re-Architecting the Internet Workshop, ReARCH@CoNEXT 2010, Philadelphia, Pennsylvania, USA, November 30, 2010}, pages = {11:1--11:6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1921233.1921247}, doi = {10.1145/1921233.1921247}, timestamp = {Thu, 09 Dec 2021 09:56:21 +0100}, biburl = {https://dblp.org/rec/conf/conext/Clark010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DiffieL09, author = {Whitfield Diffie and Susan Landau}, title = {Communications surveillance: privacy and security at risk}, journal = {Commun. {ACM}}, volume = {52}, number = {11}, pages = {42--47}, year = {2009}, url = {https://doi.org/10.1145/1592761.1592776}, doi = {10.1145/1592761.1592776}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DiffieL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau09, author = {Susan Landau}, title = {The {NRC} Takes on Data Mining, Behavioral Surveillance, and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {1}, pages = {58--62}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.25}, doi = {10.1109/MSP.2009.25}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/DiffieL09, author = {Whitfield Diffie and Susan Landau}, title = {Communications Surveillance: Privacy and Security at Risk}, journal = {{ACM} Queue}, volume = {7}, number = {8}, pages = {10}, year = {2009}, url = {https://doi.org/10.1145/1613128.1613130}, doi = {10.1145/1613128.1613130}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/DiffieL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LandauGW09, author = {Susan Landau and Hubert L{\^{e}} Van G{\^{o}}ng and Robin Wilton}, editor = {Roger Dingledine and Philippe Golle}, title = {Achieving Privacy in a Federated Identity Management System}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {51--70}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_4}, doi = {10.1007/978-3-642-03549-4\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LandauGW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Landau08, author = {Susan Landau}, title = {Privacy and security: {A} multidimensional problem}, journal = {Commun. {ACM}}, volume = {51}, number = {11}, pages = {25--26}, year = {2008}, url = {https://doi.org/10.1145/1400214.1400223}, doi = {10.1145/1400214.1400223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Landau08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBDSNR08, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Peter G. Neumann and Jennifer Rexford}, title = {Risking Communications Security: Potential Hazards of the Protect America Act}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {24--33}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.17}, doi = {10.1109/MSP.2008.17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LandauM08, author = {Susan Landau and Deirdre K. Mulligan}, title = {I'm Pc01002/SpringPeeper/ED288l.6; Who are You?}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {13--15}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.34}, doi = {10.1109/MSP.2008.34}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LandauM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau08, author = {Susan Landau}, title = {Security and Privacy Landscape in Emerging Technologies}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {4}, pages = {74--77}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.95}, doi = {10.1109/MSP.2008.95}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/DiffieL08, author = {Whitfield Diffie and Susan Landau}, title = {Privacy on the line: the politics of wiretapping and encryption}, journal = {{SIGACT} News}, volume = {39}, number = {4}, pages = {30--32}, year = {2008}, url = {https://doi.org/10.1145/1466390.1466397}, doi = {10.1145/1466390.1466397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/DiffieL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0021094, author = {Whitfield Diffie and Susan Landau}, title = {Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.)}, publisher = {{MIT} Press}, year = {2007}, url = {http://mitpress.mit.edu/books/privacy-line}, isbn = {978-0-262-04240-6}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0021094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLRN07, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Jennifer Rexford and Peter G. Neumann}, title = {Internal surveillance, external risks}, journal = {Commun. {ACM}}, volume = {50}, number = {12}, pages = {128}, year = {2007}, url = {https://doi.org/10.1145/1323688.1323717}, doi = {10.1145/1323688.1323717}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Landau06, author = {Susan Landau}, title = {National Security on the Line}, journal = {J. Telecommun. High Technol. Law}, volume = {4}, number = {2}, pages = {409--448}, year = {2006}, url = {http://www.jthtl.org/content/articles/V4I2/JTHTLv4i2\_Landau.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Landau06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LandauST06, author = {Susan Landau and Ren{\'{e}}e Stratulate and Doug Twilleager}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Consumers, fans, and control: what the games industry can teach Hollywood about {DRM}}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {1--8}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179511}, doi = {10.1145/1179509.1179511}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LandauST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Landau05, author = {Susan Landau}, title = {What lessons are we teaching?}, journal = {Commun. {ACM}}, volume = {48}, number = {6}, pages = {144}, year = {2005}, url = {https://doi.org/10.1145/1064830.1064865}, doi = {10.1145/1064830.1064865}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Landau05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBL05, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {The real national-security needs for VoIP}, journal = {Commun. {ACM}}, volume = {48}, number = {11}, pages = {120}, year = {2005}, url = {https://doi.org/10.1145/1096000.1096030}, doi = {10.1145/1096000.1096030}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LandauSLS05, author = {Susan Landau and Martin R. Stytz and Carl E. Landwehr and Fred B. Schneider}, title = {Overview of Cyber Security: {A} Crisis of Prioritization}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {3}, pages = {9--11}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.76}, doi = {10.1109/MSP.2005.76}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LandauSLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau05, author = {Susan Landau}, title = {Security, Wiretapping, and the Internet}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {6}, pages = {26--33}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.158}, doi = {10.1109/MSP.2005.158}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamm/Landau04, author = {Susan Landau}, title = {Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard}, journal = {Am. Math. Mon.}, volume = {111}, number = {2}, pages = {89--117}, year = {2004}, url = {http://www.jstor.org/stable/4145212}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tamm/Landau04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Landau04, author = {Susan Landau}, editor = {Matthew K. Franklin}, title = {Security, Liberty, and Electronic Communications}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {355--372}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_22}, doi = {10.1007/978-3-540-28628-8\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Landau04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/LandauI02, author = {Susan Landau and Neil Immerman}, title = {Embedding Linkages on an Integer Lattice}, journal = {Algorithmica}, volume = {32}, number = {3}, pages = {423--436}, year = {2002}, url = {https://doi.org/10.1007/s00453-001-0087-6}, doi = {10.1007/S00453-001-0087-6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/LandauI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Landau00, author = {Susan Landau}, title = {Designing Cryptography for the New Century}, journal = {Commun. {ACM}}, volume = {43}, number = {5}, pages = {115--120}, year = {2000}, url = {https://doi.org/10.1145/332833.332853}, doi = {10.1145/332833.332853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Landau00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/KozenLZ96, author = {Dexter Kozen and Susan Landau and Richard Zippel}, title = {Decomposition of Algebraic Functions}, journal = {J. Symb. Comput.}, volume = {22}, number = {3}, pages = {235--246}, year = {1996}, url = {https://doi.org/10.1006/jsco.1996.0051}, doi = {10.1006/JSCO.1996.0051}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/KozenLZ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ImmermanL95, author = {Neil Immerman and Susan Landau}, title = {The Complexity of Iterated Multiplication}, journal = {Inf. Comput.}, volume = {116}, number = {1}, pages = {103--116}, year = {1995}, url = {https://doi.org/10.1006/inco.1995.1007}, doi = {10.1006/INCO.1995.1007}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ImmermanL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LandauKBCDDLMNS94, author = {Susan Landau and Stephen T. Kent and Clinton Brooks and Scott Charney and Dorothy E. Denning and Whitfield Diffie and Anthony Lauck and Douglas Miller and Peter G. Neumann and David Sobel}, title = {Crypto Policy Perspectives}, journal = {Commun. {ACM}}, volume = {37}, number = {8}, pages = {115--121}, year = {1994}, url = {https://doi.org/10.1145/179606.179726}, doi = {10.1145/179606.179726}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/LandauKBCDDLMNS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/KozenLZ94, author = {Dexter Kozen and Susan Landau and Richard Zippel}, editor = {Leonard M. Adleman and Ming{-}Deh A. Huang}, title = {Decomposition of algebraic functions}, booktitle = {Algorithmic Number Theory, First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {877}, pages = {80--92}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58691-1\_46}, doi = {10.1007/3-540-58691-1\_46}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/ants/KozenLZ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/000193, author = {Susan Landau}, title = {Finding maximal subfields}, journal = {{SIGSAM} Bull.}, volume = {27}, number = {3}, pages = {4--8}, year = {1993}, url = {https://doi.org/10.1145/170906.170907}, doi = {10.1145/170906.170907}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cca/000193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Landau92, author = {Susan Landau}, title = {A Note on "Zippel Denesting"}, journal = {J. Symb. Comput.}, volume = {13}, number = {1}, pages = {41--46}, year = {1992}, url = {https://doi.org/10.1016/0747-7171(92)90004-N}, doi = {10.1016/0747-7171(92)90004-N}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Landau92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Landau92, author = {Susan Landau}, title = {Simplification of Nested Radicals}, journal = {{SIAM} J. Comput.}, volume = {21}, number = {1}, pages = {85--110}, year = {1992}, url = {https://doi.org/10.1137/0221009}, doi = {10.1137/0221009}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/Landau92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Landau91, author = {Susan Landau}, title = {Erratum: Factoring Polynomials Over Algebraic Number Fields}, journal = {{SIAM} J. Comput.}, volume = {20}, number = {5}, pages = {998}, year = {1991}, url = {https://doi.org/10.1137/0220061}, doi = {10.1137/0220061}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/Landau91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/CremonaL90, author = {John Cremona and Susan Landau}, title = {Shrinking Lattice Polyhedra}, journal = {{SIAM} J. Discret. Math.}, volume = {3}, number = {3}, pages = {338--348}, year = {1990}, url = {https://doi.org/10.1137/0403029}, doi = {10.1137/0403029}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/CremonaL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/CremonaL90, author = {John Cremona and Susan Landau}, editor = {David S. Johnson}, title = {Shrinking Lattice Polyhedra}, booktitle = {Proceedings of the First Annual {ACM-SIAM} Symposium on Discrete Algorithms, 22-24 January 1990, San Francisco, California, {USA}}, pages = {188--193}, publisher = {{SIAM}}, year = {1990}, url = {http://dl.acm.org/citation.cfm?id=320176.320197}, timestamp = {Thu, 05 Jul 2018 07:28:50 +0200}, biburl = {https://dblp.org/rec/conf/soda/CremonaL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/KozenL89, author = {Dexter Kozen and Susan Landau}, title = {Polynomial Decomposition Algorithms}, journal = {J. Symb. Comput.}, volume = {7}, number = {5}, pages = {445--456}, year = {1989}, url = {https://doi.org/10.1016/S0747-7171(89)80027-6}, doi = {10.1016/S0747-7171(89)80027-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/KozenL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/ImmermanL89, author = {Neil Immerman and Susan Landau}, title = {The Complexity of Iterated Multiplication}, booktitle = {Proceedings: Fourth Annual Structure in Complexity Theory Conference, University of Oregon, Eugene, Oregon, USA, June 19-22, 1989}, pages = {104--111}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SCT.1989.41816}, doi = {10.1109/SCT.1989.41816}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/ImmermanL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Landau89, author = {Susan Landau}, title = {Simplification of Nested Radicals}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {314--319}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63496}, doi = {10.1109/SFCS.1989.63496}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Landau89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Landau88, author = {Susan Landau}, title = {Some Remarks on Computing the Square Parts of Integers}, journal = {Inf. Comput.}, volume = {78}, number = {3}, pages = {246--253}, year = {1988}, url = {https://doi.org/10.1016/0890-5401(88)90028-4}, doi = {10.1016/0890-5401(88)90028-4}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Landau88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GathenKL87, author = {Joachim von zur Gathen and Dexter Kozen and Susan Landau}, title = {Functional Decomposition of Polynomials}, booktitle = {28th Annual Symposium on Foundations of Computer Science, Los Angeles, California, USA, 27-29 October 1987}, pages = {127--131}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/SFCS.1987.29}, doi = {10.1109/SFCS.1987.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GathenKL87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/LandauM85, author = {Susan Landau and Gary L. Miller}, title = {Solvability by Radicals is in Polynomial Time}, journal = {J. Comput. Syst. Sci.}, volume = {30}, number = {2}, pages = {179--208}, year = {1985}, url = {https://doi.org/10.1016/0022-0000(85)90013-3}, doi = {10.1016/0022-0000(85)90013-3}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/LandauM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Landau85, author = {Susan Landau}, title = {Factoring Polynomials Over Algebraic Number Fields}, journal = {{SIAM} J. Comput.}, volume = {14}, number = {1}, pages = {184--195}, year = {1985}, url = {https://doi.org/10.1137/0214015}, doi = {10.1137/0214015}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/Landau85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosam/Landau84, author = {Susan Landau}, editor = {John P. Fitch}, title = {Polynomial Time Algorithms for Galois Groups}, booktitle = {{EUROSAM} 84, International Symposium on Symbolic and Algebraic Computation, Cambridge, England, UK, July 9-11, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {174}, number = {Computation}, pages = {225--236}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/BFb0032845}, doi = {10.1007/BFB0032845}, timestamp = {Fri, 17 Jul 2020 16:12:47 +0200}, biburl = {https://dblp.org/rec/conf/eurosam/Landau84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LandauM83, author = {Susan Landau and Gary L. Miller}, editor = {David S. Johnson and Ronald Fagin and Michael L. Fredman and David Harel and Richard M. Karp and Nancy A. Lynch and Christos H. Papadimitriou and Ronald L. Rivest and Walter L. Ruzzo and Joel I. Seiferas}, title = {Solvability by Radicals is in Polynomial Time}, booktitle = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing, 25-27 April, 1983, Boston, Massachusetts, {USA}}, pages = {140--151}, publisher = {{ACM}}, year = {1983}, url = {https://doi.org/10.1145/800061.808743}, doi = {10.1145/800061.808743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/LandauM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.