Susan Landau
Orcid: 0000-0003-4826-6134Affiliations:
- Tufts University, Boston, MA, USA
- Worcester Polytechnic Institute, Department of Social Science and Policy Studies, MA, USA (former)
- Sun Microsystem Laboratories, Burlington, MA, USA (former)
- University of Massachusetts Amherst, Computer Science Department, MA, USA (former)
- Wesleyan University Middletown, Mathematics Department, CT, USA (former)
- Massachusetts Institute of Technology, Cambridge, MA, USA (PhD 1983)
According to our database1,
Susan Landau
authored at least 66 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2011, "For public policy leadership in security and privacy.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on linkedin.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals.
CoRR, 2024
2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020
2018
Commun. ACM, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
2017
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
J. Cybersecur., 2017
2016
Computer, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations.
IEEE Secur. Priv., 2014
2013
J. Telecommun. High Technol. Law, 2013
IEEE Secur. Priv., 2013
IEEE Secur. Priv., 2013
2012
2011
A computer scientist goes to washington: how to be effective in a world where facts are 10% of the equation.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
MIT Press, ISBN: 9780262015301, 2011
2010
Proceedings of the Re-Architecting the Internet Workshop, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the Financial Cryptography and Data Security, 2009
2008
IEEE Secur. Priv., 2008
2007
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
MIT Press, ISBN: 978-0-262-04240-6, 2007
2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
2005
2004
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.
Am. Math. Mon., 2004
Proceedings of the Advances in Cryptology, 2004
2002
2000
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987
1985
1984