|
Search the dblp DataBase
Susan Landau:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Neil Immerman, Susan Landau
The Complexity of Iterated Multiplication [Citation Graph (2, 0)][DBLP] Inf. Comput., 1995, v:116, n:1, pp:103-116 [Journal]
- Dexter Kozen, Susan Landau, Richard Zippel
Decomposition of algebraic functions. [Citation Graph (0, 0)][DBLP] ANTS, 1994, pp:80-92 [Conf]
- Neil Immerman, Susan Landau
The Complexity of Iterated Multiplication. [Citation Graph (0, 0)][DBLP] Structure in Complexity Theory Conference, 1989, pp:104-111 [Conf]
- Susan Landau
Security, Liberty, and Electronic Communications. [Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:355-372 [Conf]
- Susan Landau
Polynomial Time Algorithms for Galois Groups. [Citation Graph (0, 0)][DBLP] EUROSAM, 1984, pp:225-236 [Conf]
- Joachim von zur Gathen, Dexter Kozen, Susan Landau
Functional Decomposition of Polynomials [Citation Graph (0, 0)][DBLP] FOCS, 1987, pp:127-131 [Conf]
- Susan Landau
Simplification of Nested Radicals [Citation Graph (0, 0)][DBLP] FOCS, 1989, pp:314-319 [Conf]
- John Cremona, Susan Landau
Shrinking Lattice Polyhedra. [Citation Graph (0, 0)][DBLP] SODA, 1990, pp:188-193 [Conf]
- Susan Landau, Gary L. Miller
Solvability by Radicals is in Polynomial Time [Citation Graph (0, 0)][DBLP] STOC, 1983, pp:140-151 [Conf]
- Susan Landau, Neil Immerman
Embedding Linkages on an Integer Lattice. [Citation Graph (0, 0)][DBLP] Algorithmica, 2002, v:32, n:3, pp:423-436 [Journal]
- Steven M. Bellovin, Matt Blaze, Susan Landau
The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
- Susan Landau
Designing Cryptography for the New Century. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:5, pp:115-120 [Journal]
- Susan Landau
What lessons are we teaching? [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:6, pp:144- [Journal]
- Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal]
- Susan Landau
Some Remarks on Computing the Square Parts of Integers [Citation Graph (0, 0)][DBLP] Inf. Comput., 1988, v:78, n:3, pp:246-253 [Journal]
- Susan Landau
Security, Wiretapping, and the Internet. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:6, pp:26-33 [Journal]
- Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal]
- Susan Landau, Gary L. Miller
Solvability by Radicals is in Polynomial Time. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 1985, v:30, n:2, pp:179-208 [Journal]
- Dexter Kozen, Susan Landau
Polynomial Decomposition Algorithms. [Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1989, v:7, n:5, pp:445-456 [Journal]
- Dexter Kozen, Susan Landau, Richard Zippel
Decomposition of Algebraic Functions. [Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1996, v:22, n:3, pp:235-246 [Journal]
- Susan Landau
A Note on "Zippel Denesting". [Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1992, v:13, n:1, pp:41-46 [Journal]
- Susan Landau
Factoring Polynomials Over Algebraic Number Fields. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1985, v:14, n:1, pp:184-195 [Journal]
- Susan Landau
Erratum: Factoring Polynomials Over Algebraic Number Fields. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1991, v:20, n:5, pp:998- [Journal]
- Susan Landau
Simplification of Nested Radicals. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1992, v:21, n:1, pp:85-110 [Journal]
- John Cremona, Susan Landau
Shrinking Lattice Polyhedra. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 1990, v:3, n:3, pp:338-348 [Journal]
Consumers, fans, and control: what the games industry can teach Hollywood about DRM. [Citation Graph (, )][DBLP]
Achieving Privacy in a Federated Identity Management System. [Citation Graph (, )][DBLP]
Internal surveillance, external risks. [Citation Graph (, )][DBLP]
Privacy and security: A multidimensional problem. [Citation Graph (, )][DBLP]
Communications surveillance: privacy and security at risk. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.306secs
|