Landau, Susan Eva
Overview
Works: | 39 works in 150 publications in 3 languages and 7,188 library holdings |
---|---|
Genres: | Academic theses |
Roles: | Author |
Classifications: | KF9670, 342.730858 |
Publication Timeline
.
Most widely held works by
Susan Eva Landau
Privacy on the line : the politics of wiretapping and encryption by
Whitfield Diffie(
)
62 editions published between 1998 and 2019 in English and Undetermined and held by 4,534 WorldCat member libraries worldwide
Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
62 editions published between 1998 and 2019 in English and Undetermined and held by 4,534 WorldCat member libraries worldwide
Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
Surveillance or security? : the risks posed by new wiretapping technologies by
Susan Eva Landau(
)
24 editions published between 2010 and 2013 in English and Undetermined and held by 1,730 WorldCat member libraries worldwide
Focuses on the possibility of creating serious security risks by housing wiretapping within communication infrastructure and whether widespread communications surveillance enhances or endangers national security. Landau explains that understanding whether building wiretapping into communication infrastructure keeps us safe requires that we understand the technology, economics, law, and policy issues of communication surveillance technologies. She offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom
24 editions published between 2010 and 2013 in English and Undetermined and held by 1,730 WorldCat member libraries worldwide
Focuses on the possibility of creating serious security risks by housing wiretapping within communication infrastructure and whether widespread communications surveillance enhances or endangers national security. Landau explains that understanding whether building wiretapping into communication infrastructure keeps us safe requires that we understand the technology, economics, law, and policy issues of communication surveillance technologies. She offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom
Listening in : cybersecurity in an insecure age by
Susan Eva Landau(
Book
)
9 editions published between 2017 and 2019 in English and held by 550 WorldCat member libraries worldwide
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket
9 editions published between 2017 and 2019 in English and held by 550 WorldCat member libraries worldwide
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket
Privacy on the Line by
Whitfield Diffie(
)
5 editions published between 1998 and 2010 in English and Undetermined and held by 241 WorldCat member libraries worldwide
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy
5 editions published between 1998 and 2010 in English and Undetermined and held by 241 WorldCat member libraries worldwide
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy
The NBS computerized carpool matching system : users' guide by
Judith F Gilsinn(
)
3 editions published in 1974 in English and held by 39 WorldCat member libraries worldwide
3 editions published in 1974 in English and held by 39 WorldCat member libraries worldwide
Small quantity generator workbook : a self-help guide for small quantity generators of hazardous waste in Massachusetts by
Susan Eva Landau(
)
4 editions published between 1989 and 1993 in English and held by 21 WorldCat member libraries worldwide
4 editions published between 1989 and 1993 in English and held by 21 WorldCat member libraries worldwide
Codes, keys, and conflicts : issues in U.S. crypto policy : report of a special panel of the ACM U.S. Public Policy Committee
(USACM) by
Association for Computing Machinery(
Book
)
3 editions published in 1994 in English and held by 15 WorldCat member libraries worldwide
3 editions published in 1994 in English and held by 15 WorldCat member libraries worldwide
On computing Galois groups and its application to solvability by radicals by
Susan Eva Landau(
Book
)
5 editions published in 1983 in English and held by 12 WorldCat member libraries worldwide
5 editions published in 1983 in English and held by 12 WorldCat member libraries worldwide
People count : contact-tracing apps and public health by
Susan Eva Landau(
)
2 editions published in 2021 in English and held by 9 WorldCat member libraries worldwide
"A leading cybersecurity expert explores how contact tracing apps will change our societies and describes their potential for managing pandemics, with attention to privacy, social equity, and efficacy"--
2 editions published in 2021 in English and held by 9 WorldCat member libraries worldwide
"A leading cybersecurity expert explores how contact tracing apps will change our societies and describes their potential for managing pandemics, with attention to privacy, social equity, and efficacy"--
Polynomial decomposition algorithms by
Dexter Kozen(
Book
)
1 edition published in 1986 in English and held by 3 WorldCat member libraries worldwide
In a recent paper [BZ], Barton and Zippel examine the question of when a polynomial $f(x)$ over a field of characteristic 0 has a nontrivial decomposition $f(x)=g(h(x))$. They give two exponential-time algorithms, both of which require polynomial factorization. We present an $O(s[superscript]{2}r\logr)$ algorithm, where $r$=deg $g$ and $s$ =deg $h$. The algorithm does not use polynomial factorization. We also show that the problem is in $NC$. In addition, we give a new structure theorem for testing decomposibility over any field. We apply this theorem to obtain an $NC$ algorithm for decomposing irreducible polynomials over finite fields and a subexponential algorithm for decomposing irreducible polynomials over any field
1 edition published in 1986 in English and held by 3 WorldCat member libraries worldwide
In a recent paper [BZ], Barton and Zippel examine the question of when a polynomial $f(x)$ over a field of characteristic 0 has a nontrivial decomposition $f(x)=g(h(x))$. They give two exponential-time algorithms, both of which require polynomial factorization. We present an $O(s[superscript]{2}r\logr)$ algorithm, where $r$=deg $g$ and $s$ =deg $h$. The algorithm does not use polynomial factorization. We also show that the problem is in $NC$. In addition, we give a new structure theorem for testing decomposibility over any field. We apply this theorem to obtain an $NC$ algorithm for decomposing irreducible polynomials over finite fields and a subexponential algorithm for decomposing irreducible polynomials over any field
Privacy on the line the politics of wiretapping and encryption by
Whitfield Diffie(
)
1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide
Decomposition of algebraic functions by
Dexter Kozen(
Book
)
1 edition published in 1994 in English and held by 2 WorldCat member libraries worldwide
We give an algorithm for finding a nontrivial decomposition of a given algebraic function if it exists. The algorithm involves genus calculations and constructing transcendental generators of fields of genus zero."
1 edition published in 1994 in English and held by 2 WorldCat member libraries worldwide
We give an algorithm for finding a nontrivial decomposition of a given algebraic function if it exists. The algorithm involves genus calculations and constructing transcendental generators of fields of genus zero."
Limiting the undesired impact of cyber weapons : technical requirements and policy implications by
Steven M Bellovin(
)
2 editions published in 2018 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 2018 in English and held by 2 WorldCat member libraries worldwide
De 14 a 30 años en 15 segundos 14 going on 30(
Visual
)
2 editions published in 1989 in Spanish and held by 2 WorldCat member libraries worldwide
Gracias a una increíble máquina que acelera el crecimiento, el joven Danny O'Neil es transformado en adulto, en un desesperado intento de conquistar a su profesora favorita, que a su vez está prometida al profesor de gimnasia
2 editions published in 1989 in Spanish and held by 2 WorldCat member libraries worldwide
Gracias a una increíble máquina que acelera el crecimiento, el joven Danny O'Neil es transformado en adulto, en un desesperado intento de conquistar a su profesora favorita, que a su vez está prometida al profesor de gimnasia
Functional decomposition of polynomials by
Joachim von zur Gathen(
Book
)
1 edition published in 1987 in English and held by 2 WorldCat member libraries worldwide
ABSTRACT NOT AVAILABLE
1 edition published in 1987 in English and held by 2 WorldCat member libraries worldwide
ABSTRACT NOT AVAILABLE
Opinions ∙ If It Isn't Efficacious, Don't Do It by
Susan Eva Landau(
)
1 edition published in 2019 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2019 in English and held by 2 WorldCat member libraries worldwide
The complexity of iterated multiplication by
Neil Immerman(
Book
)
2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide
Abstract: "For a monoid G, the iterated multiplication problem is the computation of the product of n elements from G. By refining known completeness arguments, we show that as G varies over a natural series of important groups and monoids, the iterated multiplication problems are complete for most natural, low-level complexity classes. Furthermore, the completeness is with respect to 'first-order projections' -- low-level reductions that do not obscure the algebraic nature of these problems."
2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide
Abstract: "For a monoid G, the iterated multiplication problem is the computation of the product of n elements from G. By refining known completeness arguments, we show that as G varies over a natural series of important groups and monoids, the iterated multiplication problems are complete for most natural, low-level complexity classes. Furthermore, the completeness is with respect to 'first-order projections' -- low-level reductions that do not obscure the algebraic nature of these problems."
Od badań nad bombą do pokojowego Nobla by
Susan Eva Landau(
)
1 edition published in 1996 in Polish and held by 1 WorldCat member library worldwide
1 edition published in 1996 in Polish and held by 1 WorldCat member library worldwide
The similarities (and differences) between polynomials and integers by
Susan Eva Landau(
Book
)
1 edition published in 1992 in English and held by 1 WorldCat member library worldwide
1 edition published in 1992 in English and held by 1 WorldCat member library worldwide
A note on "Zippel denesting" by
Susan Eva Landau(
Book
)
1 edition published in 1990 in English and held by 1 WorldCat member library worldwide
Abstract: "Radical simplification is an important part of symbolic computation systems. Zippel [7] gave a sufficient condition for a nested radical to be expressed in terms of radicals of lower nesting depth. We fill a lacuna in his proof, and show that his sufficient condition is also necessary. Previous work by Landau and Miller [4] leads to an algorithm for the problem."
1 edition published in 1990 in English and held by 1 WorldCat member library worldwide
Abstract: "Radical simplification is an important part of symbolic computation systems. Zippel [7] gave a sufficient condition for a nested radical to be expressed in terms of radicals of lower nesting depth. We fill a lacuna in his proof, and show that his sufficient condition is also necessary. Previous work by Landau and Miller [4] leads to an algorithm for the problem."
more

fewer

Audience Level
0 |
![]() |
1 | ||
Kids | General | Special |

- Diffie, Whitfield Creator Author Signer
- Gilsinn, Judith F. Author
- United States National Bureau of Standards
- Pappo, Ricki
- Massachusetts Division of Hazardous Materials
- Frye, Ellen
- Boston Library Consortium OCA Digitization Project
- Association for Computing Machinery U.S. Public Policy Committee
- Kozen, Dexter 1951- Author
- ebrary, Inc
Useful Links
Associated Subjects
Algebraic number theory Algorithms Car pools--Data processing Ciphers Computational complexity Computer networks--Security measures Computer networks--Security measures--Government policy Computer security Data encryption (Computer science) Data encryption (Computer science)--Government policy Data encryption (Computer science)--Law and legislation Decomposition (Mathematics) Electronic intelligence Factorization (Mathematics) Galois theory Graph theory Group theory Hazardous wastes--Management Massachusetts Political science Polynomials Privacy, Right of Telecommunication--Law and legislation Telecommunication--Political aspects Telecommunication--Security measures Telecommunication systems--Security measures United States Wiretapping
Covers
Alternative Names
Landau, Susan.
Landau, Susan Eva
Landau, Susan Eva 1954-
Susan Eva Landau
Susan Landau Amerikaans wiskundige
Susan Landau amerikansk informatikar og matematikar
Susan Landau amerikansk informatiker og matematiker
Susan Landau matematica e ingegnere statunitense
Susan Landau matemática e ingeniera estadounidense
Susan Landau mathématicienne et ingénieure américaine
Susan Landau US-amerikanische Mathematikerin
Сьюзан Ландау
سوزان لانداو ریاضیدان و دانشمند علوم کامپیوتر آمریکایی
سوزان لاندو
수잔 랜도우
スーザン・ランダウ
蘇珊·蘭朵
Languages