Susan Landau

Orcid: 0000-0003-4826-6134

Affiliations:
  • Tufts University, Boston, MA, USA
  • Worcester Polytechnic Institute, Department of Social Science and Policy Studies, MA, USA (former)
  • Sun Microsystem Laboratories, Burlington, MA, USA (former)
  • University of Massachusetts Amherst, Computer Science Department, MA, USA (former)
  • Wesleyan University Middletown, Mathematics Department, CT, USA (former)
  • Massachusetts Institute of Technology, Cambridge, MA, USA (PhD 1983)


According to our database1, Susan Landau authored at least 66 papers between 1984 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2011, "For public policy leadership in security and privacy.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

Challenging the Machine: Contestability in Government AI Systems.
CoRR, 2024

Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals.
CoRR, 2024

2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

2022
The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022

2021
Susan Landau, Tufts University.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

2018
Programming programming languages, and analyzing Facebook's failure.
Commun. ACM, 2018

The Second Crypto War - What's Different Now.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
J. Cybersecur., 2017

2016
Transactional information is remarkably revelatory.
Proc. Natl. Acad. Sci. USA, 2016

Is It Legal? Is It Right? The Can and Should of Use.
IEEE Secur. Priv., 2016

Insecure Surveillance: Technical Issues with Remote Computer Searches.
Computer, 2016

2015
What Was Samsung Thinking?
IEEE Secur. Priv., 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Mining the Metadata - and Its Consequences.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Security and Privacy: Facing Ethical Choices.
IEEE Secur. Priv., 2014

Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations.
IEEE Secur. Priv., 2014

Summing up.
Commun. ACM, 2014

2013
The Large Immortal Machine and the Ticking Time Bomb.
J. Telecommun. High Technol. Law, 2013

Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations.
IEEE Secur. Priv., 2013

Politics, Love, and Death in a World of No Privacy.
IEEE Secur. Priv., 2013

Going Bright: Wiretapping without Weakening Communications Infrastructure.
IEEE Secur. Priv., 2013

2012
Privacy and Cybersecurity: The Next 100 Years.
Proc. IEEE, 2012

Privacy: Front and Center.
IEEE Secur. Priv., 2012

Economic tussles in federated identity management.
First Monday, 2012

Timesharing Dexter.
Proceedings of the Logic and Program Semantics, 2012

2011
As simple as possible - but not more so.
Commun. ACM, 2011

A computer scientist goes to washington: how to be effective in a world where facts are 10% of the equation.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Surveillance Or Security? The Risks Posed by New Wiretapping Technologies
MIT Press, ISBN: 9780262015301, 2011

2010
The problem isn't attribution: it's multi-stage attacks.
Proceedings of the Re-Architecting the Internet Workshop, 2010

2009
Communications Surveillance: Privacy and Security at Risk.
ACM Queue, 2009

The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy.
IEEE Secur. Priv., 2009

Achieving Privacy in a Federated Identity Management System.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Privacy on the line: the politics of wiretapping and encryption.
SIGACT News, 2008

I'm Pc01002/SpringPeeper/ED288l.6; Who are You?
IEEE Secur. Priv., 2008

Security and Privacy Landscape in Emerging Technologies.
IEEE Secur. Priv., 2008

Risking Communications Security: Potential Hazards of the Protect America Act.
IEEE Secur. Priv., 2008

Privacy and security: A multidimensional problem.
Commun. ACM, 2008

2007
Internal surveillance, external risks.
Commun. ACM, 2007

Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
MIT Press, ISBN: 978-0-262-04240-6, 2007

2006
National Security on the Line.
J. Telecommun. High Technol. Law, 2006

Consumers, fans, and control: what the games industry can teach Hollywood about DRM.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Overview of Cyber Security: A Crisis of Prioritization.
IEEE Secur. Priv., 2005

Security, Wiretapping, and the Internet.
IEEE Secur. Priv., 2005

What lessons are we teaching?
Commun. ACM, 2005

The real national-security needs for VoIP.
Commun. ACM, 2005

2004
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.
Am. Math. Mon., 2004

Security, Liberty, and Electronic Communications.
Proceedings of the Advances in Cryptology, 2004

2002
Embedding Linkages on an Integer Lattice.
Algorithmica, 2002

2000
Designing Cryptography for the New Century.
Commun. ACM, 2000

1996
Decomposition of Algebraic Functions.
J. Symb. Comput., 1996

1995
The Complexity of Iterated Multiplication
Inf. Comput., January, 1995

1994
Crypto Policy Perspectives.
Commun. ACM, 1994

1993
Finding maximal subfields.
SIGSAM Bull., 1993

1992
Simplification of Nested Radicals.
SIAM J. Comput., 1992

A Note on "Zippel Denesting".
J. Symb. Comput., 1992

1991
Erratum: Factoring Polynomials Over Algebraic Number Fields.
SIAM J. Comput., 1991

1990
Shrinking Lattice Polyhedra.
SIAM J. Discret. Math., 1990

1989
Polynomial Decomposition Algorithms.
J. Symb. Comput., 1989

1988
Some Remarks on Computing the Square Parts of Integers
Inf. Comput., September, 1988

1987
Functional Decomposition of Polynomials
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987

1985
Factoring Polynomials Over Algebraic Number Fields.
SIAM J. Comput., 1985

Solvability by Radicals is in Polynomial Time.
J. Comput. Syst. Sci., 1985

1984
Polynomial Time Algorithms for Galois Groups.
Proceedings of the EUROSAM 84, 1984


  Loading...