The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Susan Landau: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Neil Immerman, Susan Landau
    The Complexity of Iterated Multiplication [Citation Graph (2, 0)][DBLP]
    Inf. Comput., 1995, v:116, n:1, pp:103-116 [Journal]
  2. Dexter Kozen, Susan Landau, Richard Zippel
    Decomposition of algebraic functions. [Citation Graph (0, 0)][DBLP]
    ANTS, 1994, pp:80-92 [Conf]
  3. Neil Immerman, Susan Landau
    The Complexity of Iterated Multiplication. [Citation Graph (0, 0)][DBLP]
    Structure in Complexity Theory Conference, 1989, pp:104-111 [Conf]
  4. Susan Landau
    Security, Liberty, and Electronic Communications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:355-372 [Conf]
  5. Susan Landau
    Polynomial Time Algorithms for Galois Groups. [Citation Graph (0, 0)][DBLP]
    EUROSAM, 1984, pp:225-236 [Conf]
  6. Joachim von zur Gathen, Dexter Kozen, Susan Landau
    Functional Decomposition of Polynomials [Citation Graph (0, 0)][DBLP]
    FOCS, 1987, pp:127-131 [Conf]
  7. Susan Landau
    Simplification of Nested Radicals [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:314-319 [Conf]
  8. John Cremona, Susan Landau
    Shrinking Lattice Polyhedra. [Citation Graph (0, 0)][DBLP]
    SODA, 1990, pp:188-193 [Conf]
  9. Susan Landau, Gary L. Miller
    Solvability by Radicals is in Polynomial Time [Citation Graph (0, 0)][DBLP]
    STOC, 1983, pp:140-151 [Conf]
  10. Susan Landau, Neil Immerman
    Embedding Linkages on an Integer Lattice. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:32, n:3, pp:423-436 [Journal]
  11. Steven M. Bellovin, Matt Blaze, Susan Landau
    The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
  12. Susan Landau
    Designing Cryptography for the New Century. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:5, pp:115-120 [Journal]
  13. Susan Landau
    What lessons are we teaching? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:6, pp:144- [Journal]
  14. Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
    Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal]
  15. Susan Landau
    Some Remarks on Computing the Square Parts of Integers [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1988, v:78, n:3, pp:246-253 [Journal]
  16. Susan Landau
    Security, Wiretapping, and the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:26-33 [Journal]
  17. Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
    Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal]
  18. Susan Landau, Gary L. Miller
    Solvability by Radicals is in Polynomial Time. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1985, v:30, n:2, pp:179-208 [Journal]
  19. Dexter Kozen, Susan Landau
    Polynomial Decomposition Algorithms. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1989, v:7, n:5, pp:445-456 [Journal]
  20. Dexter Kozen, Susan Landau, Richard Zippel
    Decomposition of Algebraic Functions. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1996, v:22, n:3, pp:235-246 [Journal]
  21. Susan Landau
    A Note on "Zippel Denesting". [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1992, v:13, n:1, pp:41-46 [Journal]
  22. Susan Landau
    Factoring Polynomials Over Algebraic Number Fields. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1985, v:14, n:1, pp:184-195 [Journal]
  23. Susan Landau
    Erratum: Factoring Polynomials Over Algebraic Number Fields. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1991, v:20, n:5, pp:998- [Journal]
  24. Susan Landau
    Simplification of Nested Radicals. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:1, pp:85-110 [Journal]
  25. John Cremona, Susan Landau
    Shrinking Lattice Polyhedra. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1990, v:3, n:3, pp:338-348 [Journal]

  26. Consumers, fans, and control: what the games industry can teach Hollywood about DRM. [Citation Graph (, )][DBLP]


  27. Achieving Privacy in a Federated Identity Management System. [Citation Graph (, )][DBLP]


  28. Internal surveillance, external risks. [Citation Graph (, )][DBLP]


  29. Privacy and security: A multidimensional problem. [Citation Graph (, )][DBLP]


  30. Communications surveillance: privacy and security at risk. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002