Susan Landau
Orcid: 0000-0003-4826-6134Affiliations:
- Tufts University, Boston, MA, USA
- Worcester Polytechnic Institute, Department of Social Science and Policy Studies, MA, USA (former)
- Sun Microsystem Laboratories, Burlington, MA, USA (former)
- University of Massachusetts Amherst, Computer Science Department, MA, USA (former)
- Wesleyan University Middletown, Mathematics Department, CT, USA (former)
- Massachusetts Institute of Technology, Cambridge, MA, USA (PhD 1983)
According to our database1,
Susan Landau
authored at least 68 papers
between 1983 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2011, "For public policy leadership in security and privacy.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on linkedin.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
J. Cybersecur., January, 2024
Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals.
CoRR, 2024
2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020
2018
Commun. ACM, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
2017
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
J. Cybersecur., 2017
2016
Computer, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations.
IEEE Secur. Priv., 2014
2013
J. Telecommun. High Technol. Law, 2013
IEEE Secur. Priv., 2013
IEEE Secur. Priv., 2013
2012
2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
A computer scientist goes to washington: how to be effective in a world where facts are 10% of the equation.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
MIT Press, ISBN: 9780262015301, 2011
2010
Proceedings of the Re-Architecting the Internet Workshop, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the Financial Cryptography and Data Security, 2009
2008
IEEE Secur. Priv., 2008
2007
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
MIT Press, ISBN: 978-0-262-04240-6, 2007
2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
2005
2004
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.
Am. Math. Mon., 2004
Proceedings of the Advances in Cryptology, 2004
2002
2000
1994
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994
1993
1992
1991
1990
Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, 1990
1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Proceedings: Fourth Annual Structure in Complexity Theory Conference, 1989
1988
1987
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987
1985
1984
1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983