BibTeX records: Susan Landau 0001

download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-01649,
  author       = {Susan Landau and
                  James X. Dempsey and
                  Ece Kamar and
                  Steven M. Bellovin},
  title        = {Recommendations for Government Development and Use of Advanced Automated
                  Systems to Make Decisions about Individuals},
  journal      = {CoRR},
  volume       = {abs/2403.01649},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.01649},
  doi          = {10.48550/ARXIV.2403.01649},
  eprinttype    = {arXiv},
  eprint       = {2403.01649},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-01649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AnthonyGHKLMR23,
  author       = {Denise L. Anthony and
                  Carl A. Gunter and
                  Weijia He and
                  Mounib Khanafer and
                  Susan Landau and
                  Ravindra Mangar and
                  Nathan Reitinger},
  editor       = {Bart P. Knijnenburg and
                  Panos Papadimitratos},
  title        = {The HandyTech's Coming Between 1 and 4: Privacy Opportunities and
                  Challenges for the IoT Handyperson},
  booktitle    = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
                  {WPES} 2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {129--134},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603216.3624956},
  doi          = {10.1145/3603216.3624956},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/AnthonyGHKLMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/22/000122,
  author       = {Susan Landau},
  editor       = {Rebecca Slayton},
  title        = {The Development of a Crypto Policy Community: Diffie-Hellman's Impact
                  on Public Policy},
  booktitle    = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin
                  Hellman},
  series       = {{ACM} Books},
  volume       = {42},
  pages        = {213--256},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549993.3550002},
  doi          = {10.1145/3549993.3550002},
  timestamp    = {Thu, 21 Sep 2023 15:19:45 +0200},
  biburl       = {https://dblp.org/rec/books/acm/22/000122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/000121,
  author       = {Susan Landau},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Susan Landau, Tufts University},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/keynote-landau},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/000121.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/000120,
  author       = {Susan Landau},
  title        = {Categorizing Uses of Communications Metadata: Systematizing Knowledge
                  and Presenting a Path for Privacy},
  booktitle    = {{NSPW} '20: New Security Paradigms Workshop 2020, Virtual Event, USA,
                  October 26-29, 2020},
  pages        = {1--19},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442167.3442171},
  doi          = {10.1145/3442167.3442171},
  timestamp    = {Fri, 05 Feb 2021 14:28:57 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/000120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GuzdialL18,
  author       = {Mark Guzdial and
                  Susan Landau},
  title        = {Programming programming languages, and analyzing Facebook's failure},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {6},
  pages        = {8--9},
  year         = {2018},
  url          = {https://doi.org/10.1145/3204443},
  doi          = {10.1145/3204443},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/GuzdialL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Landau18,
  author       = {Susan Landau},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {The Second Crypto War - What's Different Now},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/landau},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Landau18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/BellovinLL17,
  author       = {Steven M. Bellovin and
                  Susan Landau and
                  Herbert S. Lin},
  title        = {Limiting the undesired impact of cyber weapons: technical requirements
                  and policy implications},
  journal      = {J. Cybersecur.},
  volume       = {3},
  number       = {1},
  pages        = {59--68},
  year         = {2017},
  url          = {https://doi.org/10.1093/cybsec/tyx001},
  doi          = {10.1093/CYBSEC/TYX001},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BellovinLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BellovinB016,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {Insecure Surveillance: Technical Issues with Remote Computer Searches},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {14--24},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.68},
  doi          = {10.1109/MC.2016.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BellovinB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau16,
  author       = {Susan Landau},
  title        = {Is It Legal? Is It Right? The Can and Should of Use},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {5},
  pages        = {3--5},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.105},
  doi          = {10.1109/MSP.2016.105},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pnas/000116,
  author       = {Susan Landau},
  title        = {Transactional information is remarkably revelatory},
  journal      = {Proc. Natl. Acad. Sci. {USA}},
  volume       = {113},
  number       = {20},
  pages        = {5467--5469},
  year         = {2016},
  url          = {https://doi.org/10.1073/pnas.1605356113},
  doi          = {10.1073/PNAS.1605356113},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pnas/000116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau15,
  author       = {Susan Landau},
  title        = {What Was Samsung Thinking?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {3--4},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.63},
  doi          = {10.1109/MSP.2015.63},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Landau15,
  author       = {Susan Landau},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {Mining the Metadata - and Its Consequences},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {4--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.23},
  doi          = {10.1109/ICSE.2015.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Landau15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Landau14,
  author       = {Susan Landau},
  title        = {Summing up},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {11},
  pages        = {37--39},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668901},
  doi          = {10.1145/2668901},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Landau14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau14,
  author       = {Susan Landau},
  title        = {Highlights from Making Sense of Snowden, Part {II:} What's Significant
                  in the {NSA} Revelations},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {62--64},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.161},
  doi          = {10.1109/MSP.2013.161},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau14b,
  author       = {Susan Landau},
  title        = {Security and Privacy: Facing Ethical Choices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {3--6},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.75},
  doi          = {10.1109/MSP.2014.75},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBCL13,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Sandy Clark and
                  Susan Landau},
  title        = {Going Bright: Wiretapping without Weakening Communications Infrastructure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {1},
  pages        = {62--72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.138},
  doi          = {10.1109/MSP.2012.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau13,
  author       = {Susan Landau},
  title        = {Politics, Love, and Death in a World of No Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {3},
  pages        = {11--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.65},
  doi          = {10.1109/MSP.2013.65},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau13a,
  author       = {Susan Landau},
  title        = {Making Sense from Snowden: What's Significant in the {NSA} Surveillance
                  Revelations},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {4},
  pages        = {54--63},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.90},
  doi          = {10.1109/MSP.2013.90},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Landau13,
  author       = {Susan Landau},
  title        = {The Large Immortal Machine and the Ticking Time Bomb},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {11},
  number       = {1},
  pages        = {1--44},
  year         = {2013},
  url          = {http://www.jthtl.org/content/articles/V11I1/JTHTLv11i1\_Landau.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Landau13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/LandauM12,
  author       = {Susan Landau and
                  Tyler Moore},
  title        = {Economic tussles in federated identity management},
  journal      = {First Monday},
  volume       = {17},
  number       = {10},
  year         = {2012},
  url          = {https://doi.org/10.5210/fm.v17i10.4254},
  doi          = {10.5210/FM.V17I10.4254},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/LandauM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CavoukianDFHLS12,
  author       = {Ann Cavoukian and
                  Alan Davidson and
                  Ed Felton and
                  Marit Hansen and
                  Susan Landau and
                  Anna Slomovic},
  title        = {Privacy: Front and Center},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {10--15},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.123},
  doi          = {10.1109/MSP.2012.123},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CavoukianDFHLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LandwehrBMBLL12,
  author       = {Carl E. Landwehr and
                  Dan Boneh and
                  John C. Mitchell and
                  Steven M. Bellovin and
                  Susan Landau and
                  Michael E. Lesk},
  title        = {Privacy and Cybersecurity: The Next 100 Years},
  journal      = {Proc. {IEEE}},
  volume       = {100},
  number       = {Centennial-Issue},
  pages        = {1659--1673},
  year         = {2012},
  url          = {https://doi.org/10.1109/JPROC.2012.2189794},
  doi          = {10.1109/JPROC.2012.2189794},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Landau12,
  author       = {Susan Landau},
  editor       = {Robert L. Constable and
                  Alexandra Silva},
  title        = {Timesharing Dexter},
  booktitle    = {Logic and Program Semantics - Essays Dedicated to Dexter Kozen on
                  the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {7230},
  pages        = {329--332},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29485-3\_26},
  doi          = {10.1007/978-3-642-29485-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Landau12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/mit/Landau2011,
  author       = {Susan Landau},
  title        = {Surveillance Or Security? The Risks Posed by New Wiretapping Technologies},
  publisher    = {{MIT} Press},
  year         = {2011},
  url          = {http://mitpress.mit.edu/books/surveillance-or-security},
  isbn         = {9780262015301},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/mit/Landau2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLR11,
  author       = {Steven M. Bellovin and
                  Scott O. Bradner and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford},
  title        = {As simple as possible - but not more so},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {8},
  pages        = {30--33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978542.1978553},
  doi          = {10.1145/1978542.1978553},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/Landau11,
  author       = {Susan Landau},
  editor       = {Thomas J. Cortina and
                  Ellen Lowenfeld Walker and
                  Laurie A. Smith King and
                  David R. Musicant},
  title        = {A computer scientist goes to washington: how to be effective in a
                  world where facts are 10{\%} of the equation},
  booktitle    = {Proceedings of the 42nd {ACM} technical symposium on Computer science
                  education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011},
  pages        = {237--238},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1953163.1953233},
  doi          = {10.1145/1953163.1953233},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/Landau11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/LandauM11,
  author       = {Susan Landau and
                  Tyler Moore},
  title        = {Economic Tussles in Federated Identity Management},
  booktitle    = {10th Annual Workshop on the Economics of Information Security, {WEIS}
                  2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011},
  year         = {2011},
  url          = {http://weis2011.econinfosec.org/papers/Economic\%20Tussles\%20in\%20Federated\%20Identity\%20Management.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:44 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/LandauM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Clark010,
  author       = {David D. Clark and
                  Susan Landau},
  editor       = {Bob Briscoe and
                  Peter Steenkiste},
  title        = {The problem isn't attribution: it's multi-stage attacks},
  booktitle    = {Proceedings of the Re-Architecting the Internet Workshop, ReARCH@CoNEXT
                  2010, Philadelphia, Pennsylvania, USA, November 30, 2010},
  pages        = {11:1--11:6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1921233.1921247},
  doi          = {10.1145/1921233.1921247},
  timestamp    = {Thu, 09 Dec 2021 09:56:21 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/Clark010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DiffieL09,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Communications surveillance: privacy and security at risk},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {11},
  pages        = {42--47},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592761.1592776},
  doi          = {10.1145/1592761.1592776},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DiffieL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau09,
  author       = {Susan Landau},
  title        = {The {NRC} Takes on Data Mining, Behavioral Surveillance, and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {1},
  pages        = {58--62},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.25},
  doi          = {10.1109/MSP.2009.25},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/DiffieL09,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Communications Surveillance: Privacy and Security at Risk},
  journal      = {{ACM} Queue},
  volume       = {7},
  number       = {8},
  pages        = {10},
  year         = {2009},
  url          = {https://doi.org/10.1145/1613128.1613130},
  doi          = {10.1145/1613128.1613130},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/DiffieL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LandauGW09,
  author       = {Susan Landau and
                  Hubert L{\^{e}} Van G{\^{o}}ng and
                  Robin Wilton},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Achieving Privacy in a Federated Identity Management System},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {51--70},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_4},
  doi          = {10.1007/978-3-642-03549-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LandauGW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Landau08,
  author       = {Susan Landau},
  title        = {Privacy and security: {A} multidimensional problem},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {11},
  pages        = {25--26},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400214.1400223},
  doi          = {10.1145/1400214.1400223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Landau08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBDSNR08,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Jennifer Rexford},
  title        = {Risking Communications Security: Potential Hazards of the Protect
                  America Act},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {24--33},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.17},
  doi          = {10.1109/MSP.2008.17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LandauM08,
  author       = {Susan Landau and
                  Deirdre K. Mulligan},
  title        = {I'm Pc01002/SpringPeeper/ED288l.6; Who are You?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {2},
  pages        = {13--15},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.34},
  doi          = {10.1109/MSP.2008.34},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LandauM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau08,
  author       = {Susan Landau},
  title        = {Security and Privacy Landscape in Emerging Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {4},
  pages        = {74--77},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.95},
  doi          = {10.1109/MSP.2008.95},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/DiffieL08,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Privacy on the line: the politics of wiretapping and encryption},
  journal      = {{SIGACT} News},
  volume       = {39},
  number       = {4},
  pages        = {30--32},
  year         = {2008},
  url          = {https://doi.org/10.1145/1466390.1466397},
  doi          = {10.1145/1466390.1466397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/DiffieL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0021094,
  author       = {Whitfield Diffie and
                  Susan Landau},
  title        = {Privacy on the line - the politics of wiretapping and encryption (updated
                  expanded ed.)},
  publisher    = {{MIT} Press},
  year         = {2007},
  url          = {http://mitpress.mit.edu/books/privacy-line},
  isbn         = {978-0-262-04240-6},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0021094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLRN07,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford and
                  Peter G. Neumann},
  title        = {Internal surveillance, external risks},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {12},
  pages        = {128},
  year         = {2007},
  url          = {https://doi.org/10.1145/1323688.1323717},
  doi          = {10.1145/1323688.1323717},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Landau06,
  author       = {Susan Landau},
  title        = {National Security on the Line},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {4},
  number       = {2},
  pages        = {409--448},
  year         = {2006},
  url          = {http://www.jthtl.org/content/articles/V4I2/JTHTLv4i2\_Landau.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Landau06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LandauST06,
  author       = {Susan Landau and
                  Ren{\'{e}}e Stratulate and
                  Doug Twilleager},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Consumers, fans, and control: what the games industry can teach Hollywood
                  about {DRM}},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179511},
  doi          = {10.1145/1179509.1179511},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LandauST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Landau05,
  author       = {Susan Landau},
  title        = {What lessons are we teaching?},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {6},
  pages        = {144},
  year         = {2005},
  url          = {https://doi.org/10.1145/1064830.1064865},
  doi          = {10.1145/1064830.1064865},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Landau05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBL05,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {The real national-security needs for VoIP},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {11},
  pages        = {120},
  year         = {2005},
  url          = {https://doi.org/10.1145/1096000.1096030},
  doi          = {10.1145/1096000.1096030},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LandauSLS05,
  author       = {Susan Landau and
                  Martin R. Stytz and
                  Carl E. Landwehr and
                  Fred B. Schneider},
  title        = {Overview of Cyber Security: {A} Crisis of Prioritization},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {9--11},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.76},
  doi          = {10.1109/MSP.2005.76},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LandauSLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau05,
  author       = {Susan Landau},
  title        = {Security, Wiretapping, and the Internet},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {6},
  pages        = {26--33},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.158},
  doi          = {10.1109/MSP.2005.158},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamm/Landau04,
  author       = {Susan Landau},
  title        = {Polynomials in the Nation's Service: Using Algebra to Design the Advanced
                  Encryption Standard},
  journal      = {Am. Math. Mon.},
  volume       = {111},
  number       = {2},
  pages        = {89--117},
  year         = {2004},
  url          = {http://www.jstor.org/stable/4145212},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tamm/Landau04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Landau04,
  author       = {Susan Landau},
  editor       = {Matthew K. Franklin},
  title        = {Security, Liberty, and Electronic Communications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {355--372},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_22},
  doi          = {10.1007/978-3-540-28628-8\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Landau04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/LandauI02,
  author       = {Susan Landau and
                  Neil Immerman},
  title        = {Embedding Linkages on an Integer Lattice},
  journal      = {Algorithmica},
  volume       = {32},
  number       = {3},
  pages        = {423--436},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00453-001-0087-6},
  doi          = {10.1007/S00453-001-0087-6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/LandauI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Landau00,
  author       = {Susan Landau},
  title        = {Designing Cryptography for the New Century},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {5},
  pages        = {115--120},
  year         = {2000},
  url          = {https://doi.org/10.1145/332833.332853},
  doi          = {10.1145/332833.332853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Landau00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/KozenLZ96,
  author       = {Dexter Kozen and
                  Susan Landau and
                  Richard Zippel},
  title        = {Decomposition of Algebraic Functions},
  journal      = {J. Symb. Comput.},
  volume       = {22},
  number       = {3},
  pages        = {235--246},
  year         = {1996},
  url          = {https://doi.org/10.1006/jsco.1996.0051},
  doi          = {10.1006/JSCO.1996.0051},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/KozenLZ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ImmermanL95,
  author       = {Neil Immerman and
                  Susan Landau},
  title        = {The Complexity of Iterated Multiplication},
  journal      = {Inf. Comput.},
  volume       = {116},
  number       = {1},
  pages        = {103--116},
  year         = {1995},
  url          = {https://doi.org/10.1006/inco.1995.1007},
  doi          = {10.1006/INCO.1995.1007},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ImmermanL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LandauKBCDDLMNS94,
  author       = {Susan Landau and
                  Stephen T. Kent and
                  Clinton Brooks and
                  Scott Charney and
                  Dorothy E. Denning and
                  Whitfield Diffie and
                  Anthony Lauck and
                  Douglas Miller and
                  Peter G. Neumann and
                  David Sobel},
  title        = {Crypto Policy Perspectives},
  journal      = {Commun. {ACM}},
  volume       = {37},
  number       = {8},
  pages        = {115--121},
  year         = {1994},
  url          = {https://doi.org/10.1145/179606.179726},
  doi          = {10.1145/179606.179726},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/LandauKBCDDLMNS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/KozenLZ94,
  author       = {Dexter Kozen and
                  Susan Landau and
                  Richard Zippel},
  editor       = {Leonard M. Adleman and
                  Ming{-}Deh A. Huang},
  title        = {Decomposition of algebraic functions},
  booktitle    = {Algorithmic Number Theory, First International Symposium, ANTS-I,
                  Ithaca, NY, USA, May 6-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {877},
  pages        = {80--92},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58691-1\_46},
  doi          = {10.1007/3-540-58691-1\_46},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/KozenLZ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/000193,
  author       = {Susan Landau},
  title        = {Finding maximal subfields},
  journal      = {{SIGSAM} Bull.},
  volume       = {27},
  number       = {3},
  pages        = {4--8},
  year         = {1993},
  url          = {https://doi.org/10.1145/170906.170907},
  doi          = {10.1145/170906.170907},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cca/000193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Landau92,
  author       = {Susan Landau},
  title        = {A Note on "Zippel Denesting"},
  journal      = {J. Symb. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {41--46},
  year         = {1992},
  url          = {https://doi.org/10.1016/0747-7171(92)90004-N},
  doi          = {10.1016/0747-7171(92)90004-N},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Landau92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Landau92,
  author       = {Susan Landau},
  title        = {Simplification of Nested Radicals},
  journal      = {{SIAM} J. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {85--110},
  year         = {1992},
  url          = {https://doi.org/10.1137/0221009},
  doi          = {10.1137/0221009},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Landau92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Landau91,
  author       = {Susan Landau},
  title        = {Erratum: Factoring Polynomials Over Algebraic Number Fields},
  journal      = {{SIAM} J. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {998},
  year         = {1991},
  url          = {https://doi.org/10.1137/0220061},
  doi          = {10.1137/0220061},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Landau91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/CremonaL90,
  author       = {John Cremona and
                  Susan Landau},
  title        = {Shrinking Lattice Polyhedra},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {3},
  number       = {3},
  pages        = {338--348},
  year         = {1990},
  url          = {https://doi.org/10.1137/0403029},
  doi          = {10.1137/0403029},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/CremonaL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/CremonaL90,
  author       = {John Cremona and
                  Susan Landau},
  editor       = {David S. Johnson},
  title        = {Shrinking Lattice Polyhedra},
  booktitle    = {Proceedings of the First Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  22-24 January 1990, San Francisco, California, {USA}},
  pages        = {188--193},
  publisher    = {{SIAM}},
  year         = {1990},
  url          = {http://dl.acm.org/citation.cfm?id=320176.320197},
  timestamp    = {Thu, 05 Jul 2018 07:28:50 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/CremonaL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/KozenL89,
  author       = {Dexter Kozen and
                  Susan Landau},
  title        = {Polynomial Decomposition Algorithms},
  journal      = {J. Symb. Comput.},
  volume       = {7},
  number       = {5},
  pages        = {445--456},
  year         = {1989},
  url          = {https://doi.org/10.1016/S0747-7171(89)80027-6},
  doi          = {10.1016/S0747-7171(89)80027-6},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/KozenL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ImmermanL89,
  author       = {Neil Immerman and
                  Susan Landau},
  title        = {The Complexity of Iterated Multiplication},
  booktitle    = {Proceedings: Fourth Annual Structure in Complexity Theory Conference,
                  University of Oregon, Eugene, Oregon, USA, June 19-22, 1989},
  pages        = {104--111},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SCT.1989.41816},
  doi          = {10.1109/SCT.1989.41816},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/ImmermanL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Landau89,
  author       = {Susan Landau},
  title        = {Simplification of Nested Radicals},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {314--319},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63496},
  doi          = {10.1109/SFCS.1989.63496},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Landau89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Landau88,
  author       = {Susan Landau},
  title        = {Some Remarks on Computing the Square Parts of Integers},
  journal      = {Inf. Comput.},
  volume       = {78},
  number       = {3},
  pages        = {246--253},
  year         = {1988},
  url          = {https://doi.org/10.1016/0890-5401(88)90028-4},
  doi          = {10.1016/0890-5401(88)90028-4},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Landau88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GathenKL87,
  author       = {Joachim von zur Gathen and
                  Dexter Kozen and
                  Susan Landau},
  title        = {Functional Decomposition of Polynomials},
  booktitle    = {28th Annual Symposium on Foundations of Computer Science, Los Angeles,
                  California, USA, 27-29 October 1987},
  pages        = {127--131},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/SFCS.1987.29},
  doi          = {10.1109/SFCS.1987.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GathenKL87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/LandauM85,
  author       = {Susan Landau and
                  Gary L. Miller},
  title        = {Solvability by Radicals is in Polynomial Time},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {30},
  number       = {2},
  pages        = {179--208},
  year         = {1985},
  url          = {https://doi.org/10.1016/0022-0000(85)90013-3},
  doi          = {10.1016/0022-0000(85)90013-3},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/LandauM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Landau85,
  author       = {Susan Landau},
  title        = {Factoring Polynomials Over Algebraic Number Fields},
  journal      = {{SIAM} J. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {184--195},
  year         = {1985},
  url          = {https://doi.org/10.1137/0214015},
  doi          = {10.1137/0214015},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Landau85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosam/Landau84,
  author       = {Susan Landau},
  editor       = {John P. Fitch},
  title        = {Polynomial Time Algorithms for Galois Groups},
  booktitle    = {{EUROSAM} 84, International Symposium on Symbolic and Algebraic Computation,
                  Cambridge, England, UK, July 9-11, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {174},
  number       = {Computation},
  pages        = {225--236},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/BFb0032845},
  doi          = {10.1007/BFB0032845},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosam/Landau84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LandauM83,
  author       = {Susan Landau and
                  Gary L. Miller},
  editor       = {David S. Johnson and
                  Ronald Fagin and
                  Michael L. Fredman and
                  David Harel and
                  Richard M. Karp and
                  Nancy A. Lynch and
                  Christos H. Papadimitriou and
                  Ronald L. Rivest and
                  Walter L. Ruzzo and
                  Joel I. Seiferas},
  title        = {Solvability by Radicals is in Polynomial Time},
  booktitle    = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing,
                  25-27 April, 1983, Boston, Massachusetts, {USA}},
  pages        = {140--151},
  publisher    = {{ACM}},
  year         = {1983},
  url          = {https://doi.org/10.1145/800061.808743},
  doi          = {10.1145/800061.808743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/LandauM83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics