Name
Affiliation
Papers
SUSAN LANDAU
Univ. of Massachusetts, Amherst
34
Collaborators
Citations 
PageRank 
41
172
28.89
Referers 
Referees 
References 
416
144
84
Search Limit
100416
Title
Citations
PageRank
Year
Categorizing Uses of Communications Metadata - Systematizing Knowledge and Presenting a Path for Privacy.00.342020
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.00.342017
Insecure Surveillance: Technical Issues with Remote Computer Searches.00.342016
Transactional Information Is Remarkably Revelatory10.402016
Is It Legal? Is It Right? The Can and Should of Use.00.342016
Keys under doormats: mandating insecurity by requiring government access to all data and communications.90.702015
Keys under doormats100.852015
Educating Engineers: Teaching Privacy in a World of Open Doors20.382014
Going Bright: Wiretapping without Weakening Communications Infrastructure40.462013
Politics, love, and death in a world of no privacy10.632013
The Large Immortal Machine and the Ticking Time Bomb.10.532013
Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations291.812013
Privacy and Cybersecurity: The Next 100 Years.30.402012
Economic tussles in federated identity management.110.762012
The problem isn't attribution: it's multi-stage attacks110.612010
Achieving Privacy in a Federated Identity Management System80.532009
Communications surveillance: privacy and security at risk00.342009
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy00.342009
I'm Pc01002/SpringPeeper/ED288l.6; Who are You?00.342008
Security and Privacy Landscape in Emerging Technologies20.452008
Privacy and security: A multidimensional problem100.582008
Risking Communications Security: Potential Hazards of the Protect America Act192.762008
Privacy on the line: the politics of wiretapping and encryption185.742008
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition41.462008
Internal surveillance, external risks10.352007
Consumers, fans, and control: what the games industry can teach Hollywood about DRM20.402006
National Security on the Line.11.122006
The real national-security needs for VoIP40.612005
Overview of Cyber Security: A Crisis of Prioritization30.432005
What lessons are we teaching?00.342005
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard50.632004
Designing Cryptography For The New Century30.882000
Crypto policy perspectives42.071994
Some remarks on computing the square parts of integers60.651988