Privacy on the line: The politics of wiretapping and encryption W Diffie, S Landau The MIT Press, 2010 | 453 | 2010 |
Keys under doormats H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, WW Diffie, ... Communications of the ACM 58 (10), 24-26, 2015 | 279 | 2015 |
Making sense from Snowden: What's significant in the NSA surveillance revelations S Landau IEEE Security & Privacy 11 (4), 54-63, 2013 | 256 | 2013 |
Security standards for the RFID market T Phillips, T Karygiannis, R Kuhn IEEE Security & Privacy 3 (6), 85-89, 2005 | 212 | 2005 |
Untangling attribution DD Clark, S Landau Harv. Nat'l Sec. J. 2, 323, 2011 | 201 | 2011 |
Factoring polynomials over algebraic number fields S Landau SIAM Journal on Computing 14 (1), 184-195, 1985 | 176 | 1985 |
Solvability by radicals is in polynomial time S Landau, GL Miller Proceedings of the fifteenth annual ACM symposium on Theory of computing …, 1983 | 156 | 1983 |
Polynomial decomposition algorithms D Kozen, S Landau Journal of Symbolic Computation 7 (5), 445-456, 1989 | 140 | 1989 |
Surveillance or security?: The risks posed by new wiretapping technologies S Landau Mit Press, 2011 | 134 | 2011 |
The complexity of iterated multiplication N Immerman, S Landau Information and Computation 116 (1), 103-116, 1995 | 120 | 1995 |
Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet SM Bellovin, M Blaze, S Clark, S Landau Nw. J. Tech. & Intell. Prop. 12, 1, 2014 | 102 | 2014 |
Control use of data to protect privacy S Landau Science 347 (6221), 504-506, 2015 | 95 | 2015 |
Highlights from making sense of Snowden, part II: What's significant in the NSA revelations S Landau IEEE Security & Privacy 12 (1), 62-64, 2014 | 93 | 2014 |
Standing the test of time: The data encryption standard S Landau Notices of the AMS 47 (3), 341-349, 2000 | 81 | 2000 |
Privacy on the Line W Diffie, S Landau The Politics of Wiretapping and Encryption, 1998 | 80 | 1998 |
Simplification of nested radicals S Landau SIAM Journal on Computing 21 (1), 85-110, 1992 | 66 | 1992 |
The problem isn't attribution: it's multi-stage attacks DD Clark, S Landau Proceedings of the Re-architecting the Internet Workshop, 1-6, 2010 | 63 | 2010 |
Economic tussles in federated identity management S Landau, T Moore First Monday, 2012 | 51 | 2012 |
Privacy and cybersecurity: The next 100 years C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012 | 47 | 2012 |
Polynomials in the nation's service: Using algebra to design the advanced encryption standard S Landau The American Mathematical Monthly 111 (2), 89-117, 2004 | 47 | 2004 |