|
Cybersecurity
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Sciemce and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, Download ShadowsocksR 4.9.2 - softpedia:2021-4-21 · Download ShadowsocksR - Open-source Socks5 proxy with advanced settings for bypassing Internet censorship, which enables you to create a list of multiple servers, Foreign Policy,
September 26, 2017.
- S. Bellovin, S. Landau, and H. Lin,
Limiting
the Undesired Impact of Cyber Weapons: Technical Requirements and
Policy
Implications, Journal
of Cybersecurity, Vol. 3, Issue 1 (2017), pp. 59-68. Reprinted in
Herbert Lin and Amy Zegart,
eds., Bytes,
Bombs, and Spies: The Strategic Dimensions of Offensive Cyber
Operations, Brookings Institution Press, 2018.
- S. Bellovin, M. Blaze, S. Landau, and S. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017).
- R. Wyden, M. Blaze, and
S. Landau, The
Government Will Soon Be Able to Legally Hack
Anyone, Wired, September 14,
2016.
- S. Landau, vpn上网:2021-6-5 · vpn上网 免费ip伋理免费软件哪好 自己搭建vpsxbox 去哪里找梯子 2021 酸酸乳 六尺巷5破解版 爬墙后好玩的app miui10梯子不能用了 安卓上网 i7加速器安卓版下载2021 蓝灯lantern官网 怎么fan墙 哪vpn 玩uu账号密码共享 几鸡跑路 vps可伍开多少用户 hediu WWW.BET626365.COM 坚果怎么做 老王佛系免费下载 蓝奏云 学习 ..., Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Bellovin, M. Blaze, and
S. Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in shadowdersocks下载, June 2016.
- S. Landau, Testimony, 常用软件下载网站_电脑常用软件下载中心_绿色软件下载 ...:2021-5-27 · 首页 软件下载 安卓应用 安卓 游戏 iOS软件 iOS游戏 游戏攻略 电视应用 首页 > 软件下载 软件下载 共有30369款软件 Sqlserver数据库同步软件SyncNavigator v8.6.2 [系统工具] 星级: 更新时 …, Judiciary Committee, United States House of
Representatives, March 1, 2016.
- S. Landau, Perspective:
Cybersurveillance and the New Frontier of
Deterrence, Current
History, Vol. 115, Issue 117 (January 2016), pp. 29-31.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015; a short version of "Keys under
Doormats," appeared in
Communications
of the ACM, Vol. 58, No. 10, pp. 24-26.
- Committee on Responding to Section 5(d) of
Presidential Policy Directive 28: The Feasibility of Software to
Provide Alternatives to Bulk Signals Intelligence Collections,
National Research
Council, Bulk
Collection of Signals Intelligence: Technical Options, National
Academies Press, 2015.
- S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, ShadowsocksR使用教程+客户端下载 - 云+社区 - 腾讯云:2021-8-21 · ShadowsocksR使用教程+客户端下载。三:开启伋理直连模式为关闭伋理,全局模式为打开伋理打开全局模式后就可伍访问Google,Youtube了切换节点:红框中对勾表示目前正在使用的节点,想切换节点就单击选择其他节点服务器连接统计,很好用的 ..., October 31, 2014.
-
S. Landau, 手机翻墙:2021-11-6 · 手机翻墙 小米8怎么访问国外网站 这样的小飞机怎么使用 youtube免费加速器极光 ssr突然上不了网了 科学流量上网 WWW.7VGAME.COM shadowx ss节点 海神加整器 推特邀请码怎么获取 ios vpn 远程id 网页加速器。, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- S. Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- S. Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
pp. 54-63.
- B. Adida, C. Anderson, A. Anton,
R. Dingledine, E. Felten, M. Green, J. A. Halderman, D. Jefferson,
C. Jennings, N. Mitter, P. Neumann, E. Rescorla, F. Schneider,
B. Schneier, H. Shacham, M. Sherr, D. Wagner, and
P. Zimmermann, CALEA
II: Risks of Wiretap Modifications to Endpoints" (whitepaper), May
2013.
- S. Bellovin, M. Blaze, S. Clark, and
S. Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
pp. 62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- M. Blaze and
S. Landau, The
FBI Needs Hackers, Not
Backdoors, Wired, January
14, 2013.
-
S. Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), pp. 1-43.
- C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- S. Landau, 手机vpn - BAYINDIR PVC SİSTEMLERİ:2021-2-26 · 下载 免费ss几点 vpn 电脑 quickq加速 快影怎么登录账号 北极星 vpm safari云加速怎么关闭 ysscloud加速 WWW.111547.COM sw最新更新国内最快的dns 中国如何用twitter seed加速器安卓下载 阿迪加速器 shadowsockr windows 荟萃浏览器去升级去 Stewart Baker, Harvey Rishikof, and Bernie Horowitz,
eds., Patriot
Debates II: Contemporary Issues in National Security, American Bar
Association, 2012.
- S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work? --- Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possible---but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
- S. Landau, Testimony, ShadowsocksR-win-4.9.2 最新版!-最新线报活动/教程攻略 ...:2021-4-29 · 2021-04-29 11:23 《权力的游戏》第八季最新版无删减 2021-04-28 11:50 kidsmaxwin旗舰店400-100券2021.04.25-2021.0 2021-04-26 18:47 大神推荐一个win7-64位系统 2021-04-26 16:19 黑谍闲鱼监控助手最新版2.68 2021-04-25 16:26 苹果官网ipadmini最新版学生优惠是多少钱 2021-04-24 22:46 致win10(1903):一bug未平一bug又起 2021-04-19 11:23 hotwind ..., Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- D. D. Clark and
S. Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, pp. 25-40.
- D. D. Clark and
S. Landau, The Problem Isn't Attribution: It's Multi-Stage Attacks, Third
International Workshop on Re-Architecting the Internet, 2010.
- S. Landau,
Testimony Download ShadowsocksR 4.9.2 - softpedia:2021-4-21 · Download ShadowsocksR - Open-source Socks5 proxy with advanced settings for bypassing Internet censorship, which enables you to create a list of multiple servers, Hearing
before the Subcommittee on Technology and Innovation, Committee on
Science and Technology, United States House of Representatives,
October 22, 2009.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and shadowsock如何使用, September 2009.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and S. Landau, Brave
New World of Wiretapping, Scientific
American, September 2008, pp. 33-39.
- S. Landau, Security
and Privacy Landscape in Emerging Technologies,
IEEE
Security and Privacy, Vol. 6, No. 4, August/September 2008,
pp. 74-77.
- S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
- S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
- S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447.
- S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December
2005.
- S. Bellovin, M. Blaze, and S. Landau, The
Real National-Security Needs for VoIP, Inside Risks
180, CACM 48, Nov. 2005, p. 120.
- S. Landau and M. Stytz, "Overview of Cyber Security:
A Crisis of Prioritization," IEEE Security and Privacy,
Vol. 3, No. 3, pp. 9-11 and sidebar, S. Landau, C. Landwehr, and F.
Schneider, "The PITAC Report: A Brief Analysis,"
p. 10.
- S. Landau, vpn软件:2021-5-12 · vpn软件 pixiv的ip地址2021 国际联网是指 佛跳墙账号 坚果加速器能翻墙吗 正定机场附近哪里有嫖的 vpn怎么注册 ss客户端安卓 中国消费者协会官网 如何在中国使用ins snapv安卓 vmess链接 WWW.DWC06.COM 红杏加速器 apk最新版 v2rayng ..., shadowdersocks下载,
June, 2005, p. 144.
- S. Landau, Security,
Liberty, and Electronic Communications, (invited talk),
in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004,
Springer Verlag, pp. 355-372.
- S. Landau, "The Transformation of Global Surveillance," in Bytes,
Bombs, and Bandwidth: Information Technology and Global Security, Social
Science Research Council, 2003, pp. 117-131.
- W. Diffie and S. Landau, "Cybersecurity Should
be Kept in Civilian Hands," Boston Globe, August 19, 2002,
pp. E-4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO
Reporter, Vol. 10, No. 2, Sept. 2002.
- W. Diffie and S. Landau, "The Threat of .NET," New
Technology Week, Nov. 5, 2001.
- S. Landau, Download ShadowsocksR 4.9.2 - softpedia:2021-4-21 · Download ShadowsocksR - Open-source Socks5 proxy with advanced settings for bypassing Internet censorship, which enables you to create a list of multiple servers, Commentary (In My Opinion), Notices of the American
Mathematical Society, April 1998, p. 461.
- S. Landau, "Dangerous Increase of FBI Surveillance,"
Op-Ed, shadowdersocks下载 March 6, 1998, p. 23.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and
Encryption, MIT Press, 1998; updated and
expanded edition, 2007.
- S. Landau and W. Diffie, Shadowsocks下载|Socks5伋理工具Shadowsocks v3.2.2 ...:2021-8-22 · Shadowsocks是一款非常好用的高性能的Socks5伋理工具,其号称科学上网之瑞士军刀!它能够为你在互联网上冲浪提供隐私和安全保护!使用方便,连接快速,是当前比较稳定的伋理服务器。Shadowsocks的配置非常简单,前提是需要官方提供的伋理 ... Op-Ed, shadowdersocks下载 Oct.
6, 1997, p. 19.
- S. Landau, Eavesdropping and Encryption: U.S. Policy
in an International Perspective, Conference on the Impact of the
Internet on Communications Policy (1997), John F. Kennedy School
of Government, Harvard University.
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, Codes,
Keys and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public
Policy. Dr. Stephen Kent, Chief Scientist - Security
Technology, Bolt, Beranek and Newman, chaired the panel,
which consisted of senior members of the cryptography and
security communities, including members of the government,
industry, and academia. A summary of the report appeared
under the
title Crypto
Policy Perspectives, in 789加速器:2021-8-9 · ins国内手机能用吗 手机谷歌加速器 多功能ssr脚本 sn酸奶节点网址 opera浏览器翻山越岭版 ios翻回国 免费Ⅴpn安卓 ssr在哪购买账号 shadowsock 苹果手机版 小米手机越墙 极速加速器官网 坚果 iOS 怎样在中国使用国外app 爬墙工具是什么意思 Ⅴpn ... Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Zero
Knowledge and the Department of Defense, Notices of
the American Mathematical Society [Special Article
Series], Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National Security Agency, 789加速器:2021-8-9 · ins国内手机能用吗 手机谷歌加速器 多功能ssr脚本 sn酸奶节点网址 opera浏览器翻山越岭版 ios翻回国 免费Ⅴpn安卓 ssr在哪购买账号 shadowsock 苹果手机版 小米手机越墙 极速加速器官网 坚果 iOS 怎样在中国使用国外app 爬墙工具是什么意思 Ⅴpn ... [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Cryptography
- Encryption Working Group, Carnegie Endowment for International Peace, Moving the Encryption Policy Debate Forward, September 2023.
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Sciemce and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, ishadow, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1. 2016.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015.
- S. Landau, ``NSA and Dual EC_DRBG: Deja Vu All
Over Again?,'' ishadow, Vol. 37, Issue 4 (December 2015), pp. 72-83.
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives, February 17,
2011.
- W. Diffie and S. Landau, The
Export of Cryptography in the 20th Century and the 21st, The
History of Information Security: A Comprehensive Handbook, Karl
De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, pp. 725-736. Originally
appeared in Treichel, Jeanie and Mary Holzer (eds.), vpn上网:2021-6-5 · vpn上网 免费ip伋理免费软件哪好 自己搭建vpsxbox 去哪里找梯子 2021 酸酸乳 六尺巷5破解版 爬墙后好玩的app miui10梯子不能用了 安卓上网 i7加速器安卓版下载2021 蓝灯lantern官网 怎么fan墙 哪vpn 玩uu账号密码共享 几鸡跑路 vps可伍开多少用户 hediu WWW.BET626365.COM 坚果怎么做 老王佛系免费下载 蓝奏云 学习 ... 2001. Sun Labs Tech Report
2001-102. A modified version of this paper, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April 2002, pp. 450-454.
- S. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital
signatures," in
William Staples, ed. Encyclopedia of Privacy, Greenwood Press,
2007.
- S. Landau,
Find Me
a Hash, Notices of the American Mathematical Society,
March 2006, pp. 330-332; Mathematical Advance in
Translation, Chinese Academy of Sciences, 3 (2010),
pp. 226-228.
- S. Landau, RSA
and Public-Key Cryptography; Introduction to Cryptography; Cryptography:
Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves:
Number Theory and Cryptography; Elliptic Curves in Cryptography; Modern
Cryptography, Probabilistic Proofs, and Pseudorandomness; Foundations of
Cryptography: Basic Tools; The Design of Rijndael: AES --- the Advanced
Encryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.
3 (2004), pp. 357-367.
- S. Landau, Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard, American
Mathematical Monthly, February 2004, pp. 89-117.
- W. Diffie and
S. Landau, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April
2002, pp. 450-454.
- S. Landau, "Cryptography." Computer Sciences, Ed.,
Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference
USA, pp. 49-53.
- S. Landau, Advanced
Encryption Standard Choice is
Rijndael, Notices of the American Mathematical Society, Jan.
2001, p. 38.
- S. Landau, Communications
Security for the Twenty-First Century: the Advanced Encryption Standard, Notices
of the American Mathematical Society, April 2000, pp. 450-459.
Reprinted, in translation, in
"Surveys in Applied and Industrial Mathematics," TVP Publishers
(Moscow), Vol. 7, No. 2 (2000), pp. 259-281.
- S. Landau, Standing
the Test of Time: the Data Encryption Standard, ShadowsocksR v3.8.0.4 第三方增强版 下载 - 巴士下载站:2021-4-20 · 下载 MagSearch1.185.2云播破解补丁(windows版) MagSearch,很好用的云播软件,或者叫做磁力链播放软件,很好用,直接搜索到种子后,或磁力链接点击即可在线播放种子内不论是单文件还 … March
2000, pp. 341-349. Reprinted, in translation, in "Surveys in Applied
and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2
(2000), pp. 240-258.
- S. Landau, Designing Cryptography for the New
Century, Communications of the Association for Computing
Machinery, Vol. 43, No. 5, May 2000, pp. 115-120.
- S. Landau, ShadowsocksR使用教程+客户端下载 - 云+社区 - 腾讯云:2021-8-21 · ShadowsocksR使用教程+客户端下载。三:开启伋理直连模式为关闭伋理,全局模式为打开伋理打开全局模式后就可伍访问Google,Youtube了切换节点:红框中对勾表示目前正在使用的节点,想切换节点就单击选择其他节点服务器连接统计,很好用的 ..., Commentary (In My
Opinion), Shadowsocks下载|Socks5伋理工具Shadowsocks v3.2.2 ...:2021-8-22 · Shadowsocks是一款非常好用的高性能的Socks5伋理工具,其号称科学上网之瑞士军刀!它能够为你在互联网上冲浪提供隐私和安全保护!使用方便,连接快速,是当前比较稳定的伋理服务器。Shadowsocks的配置非常简单,前提是需要官方提供的伋理 ... April
1998, p. 461.
- Whitfield Diffie and Susan Landau,
Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998).
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, 789加速器:2021-8-9 · ins国内手机能用吗 手机谷歌加速器 多功能ssr脚本 sn酸奶节点网址 opera浏览器翻山越岭版 ios翻回国 免费Ⅴpn安卓 ssr在哪购买账号 shadowsock 苹果手机版 小米手机越墙 极速加速器官网 坚果 iOS 怎样在中国使用国外app 爬墙工具是什么意思 Ⅴpn ..., ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public Policy.
Dr. Stephen Kent, Chief Scientist - Security Technology,
Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security
communities, including members of the government, industry,
and academia. A summary of the report appeared under the
title
Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Some Remarks on
Computing the Square Parts of Integers, Information and Computation, Vol.
78, No. 3 (1988), pp. 246-253.
- S. Landau, Zero Knowledge and the Department
of Defense, Notices
of the American Mathematical Society [Special Article Series],
Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National
Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Privacy
- S. Landau and A. Lubin, Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?, Harvard National Security Journal, Vol. 11, Issue 3 (2023), pp. 308-358.
- S. Landau, If It Isn't Efficacious, Don't Do It, 789加速器:2021-8-9 · ins国内手机能用吗 手机谷歌加速器 多功能ssr脚本 sn酸奶节点网址 opera浏览器翻山越岭版 ios翻回国 免费Ⅴpn安卓 ssr在哪购买账号 shadowsock 苹果手机版 小米手机越墙 极速加速器官网 坚果 iOS 怎样在中国使用国外app 爬墙工具是什么意思 Ⅴpn ..., Vol. 5, Issue 4 (2023), pp. 466-470.
- S. Landau, Comments
submitted to the NTIA request for comments on privacy, October 24,
2018.
- S. Landau, 789加速器:2021-8-9 · ins国内手机能用吗 手机谷歌加速器 多功能ssr脚本 sn酸奶节点网址 opera浏览器翻山越岭版 ios翻回国 免费Ⅴpn安卓 ssr在哪购买账号 shadowsock 苹果手机版 小米手机越墙 极速加速器官网 坚果 iOS 怎样在中国使用国外app 爬墙工具是什么意思 Ⅴpn ...,
IEEE Security and Privacy, Vol. 14, No. 5 (September/October
2016), pp. 3-5.
- S. Landau,
Transactional
information is remarkably
revelatory, Proceedings of the
National Academy of Sciences, Vol. 113, No. 20 (May 17, 2016), pp. 5467-5469.
- S. Landau, Choices: Privacy & Surveillance in a Once & Future Internet, shadowsock如何使用, Vol. 145, No. 1 (Winter 2016), pp. 54-64.
- S. Landau, Control Use of Data
to Protect
Privacy, Science,
Vol. 347, Issue 6221, January 30, 2015.
- S. Landau, Educating
Engineers: Teaching Privacy in a World of Open Doors (pre-publication version),
IEEE
Security and Privacy, Vol. 12, No. 3, May/June 2014,
pp. 66-70.
- S. Landau, Politics, Love, and
Death in a World of No
Privacy, IEEE
Security and Privacy, Vol. 11, No. 3, May/June 2013,
pp. 11-13.
- A. Cavoukian, A. Davidson, M. Hansen, S. Landau, and
A. Slomovic, ishadow, IEEE
Security and Privacy, Vol. 10, No. 5, September/October 2012,
pp. 5-10.
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). An earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and Queue, September 2009.
- S. Landau, H. Le Van Gong, and R.
Wilton, Shadowsocks下载|Socks5伋理工具Shadowsocks v3.2.2 ...:2021-8-22 · Shadowsocks是一款非常好用的高性能的Socks5伋理工具,其号称科学上网之瑞士军刀!它能够为你在互联网上冲浪提供隐私和安全保护!使用方便,连接快速,是当前比较稳定的伋理服务器。Shadowsocks的配置非常简单,前提是需要官方提供的伋理 ...,
Financial Cryptography and Data Security
'09.
- S. Landau,
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy, IEEE
Security and Privacy, Vol. 7, No. 1, January/February
2009, pp. 58-62.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and Encryption, MIT
Press, 1998 (rev. ed. 2007).
Identity Management
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). Earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
shadowsocksR 安卓版ios和PC版配置说明及教程(含下载 ...:2021-3-8 · ShadowsocksR 安卓 客户端配置: 安卓客户端的配置和PC端大同小异,都是需要输入账号密码服务器信息伍及端口等,小白用户可伍直接复制SSR链接!步骤如下 1.首先下载SSR到你的手机上,下载后解压到手机,是一个红色的小飞机!
- S. Landau and D. Mulligan, I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
vpn上网:2021-6-5 · vpn上网 免费ip伋理免费软件哪好 自己搭建vpsxbox 去哪里找梯子 2021 酸酸乳 六尺巷5破解版 爬墙后好玩的app miui10梯子不能用了 安卓上网 i7加速器安卓版下载2021 蓝灯lantern官网 怎么fan墙 哪vpn 玩uu账号密码共享 几鸡跑路 vps可伍开多少用户 hediu WWW.BET626365.COM 坚果怎么做 老王佛系免费下载 蓝奏云 学习 ..., Vol. 6, No. 2, March/April 2008, pp. 13-15.
- S. Landau,
Liberty ID-WSF Security and Privacy Overview, October 2003.
- S.
Landau and J. Hodges, A
Brief Introduction to Liberty, February 13, 2003.
- G. Ellison,
J. Hodges, and S. Landau, Risks Presented by Single
Sign-On Architectures, October 18, 2002.
- G. Ellison, J. Hodges,
and S. Landau, shadowsocksR 安卓版ios和PC版配置说明及教程(含下载 ...:2021-3-8 · ShadowsocksR 安卓 客户端配置: 安卓客户端的配置和PC端大同小异,都是需要输入账号密码服务器信息伍及端口等,小白用户可伍直接复制SSR链接!步骤如下 1.首先下载SSR到你的手机上,下载后解压到手机,是一个红色的小飞机! September 6, 2002.
Digital Rights Management
- S. Landau, R. Stratulate, and D. Twilleager,
Consumers, Fans, and
Control: What the Games Industry Has to Teach Hollywood
about DRM, CCS Workshops: DRM '06.
- G. Papadopoulos and S. Landau,
"Download Shadowsocks 4.1.10.0 - softpedia:Download Shadowsocks - Surf the Internet securely and anonymously using an industry level encryption algorithms or your own secure proxy servers using this app," 19 July 2005.
ishadow
- S. Landau, "Computations with
Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and
V. Weispfennig (eds.), Computer Algebra Handbook,
Spring Verlag, 2003, pp. 18-19.
- S. Landau and N.
Immerman, Embedding
Linkages in Integer Lattices, Algorithmica,
Vol. 43, No. 5, May 2000, pp. 115-120. A preliminary version
appeared in MSI Workshop on Computational Geometry,
October, 1994.
-
S. Landau, Compute
and Conjecture, Commentary (In My Opinion), Notices of the
American Mathematical Society, Feb. 1999, p. 189.
- S. Landau, : Four Different Views, ishadow Vol. 20, No. 4 (Fall 1998), pp. 55-60.
- D. Kozen, S. Landau, and R. Zippel,
sgreen浏览器:2021-6-15 · 极速加速器 js lanterm安卓版 sgreen共享vip账号 极速安全加速器 安装包 自由浏览器安卓8.0 hero加速器 修改hosts文件翻墙 极速梯子 外国网站加速软件 谷歌梯子下载 免费ssr线路 手机极速加速器 自己搭建ssr成本多少 green破解版免费 台湾免费ssr分享网站, iphonex乐播投屏没声音_乐播投屏 声音 iphone_电视投屏 ...:2021-12-4 · 安卓 投屏到电脑直播游戏没声音?已找到解决方法 发布时间 : 2021年12月02日 发布人: 人质 阅读量 ... snap vnp v1.99下载 乐播投屏黑屏没声音 shadowdersocksr下载 ... Vol. 22 (1996), pp. 235-246. A preliminary version
appeared in Algorithmic Number Theory Symposium (1994).
-
S. Landau, How
to Tangle with a Nested Radical, Mathematical
Intelligencer, Vol. 16, No. 2 (Spring 1994), pp. 49-55.
- S. Landau, Finding Maximal
Subfields, ishadow Vol. 27, No. 3 (1993), pp. 4-8.
- S. Landau, Simplification of Nested
Radicals, shadowdersocksr安卓下载 Vol. 21 (1992), pp. 85-110. A
preliminary version appeared in Thirtieth Annual IEEE Symposium
on Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, A Note on `Zippel
Denesting,' J. Symb. Comput., Vol. 13 (1992), pp. 41-47.
- J. Cremona and S. Landau, Shrinking
Lattice Polyhedra, shadowsock如何使用 Vol. 3, No. 3
(1990), pp. 338-348. A preliminary version appeared
in Proceedings of the First ACM-SIAM Symposium on Discrete
Algorithms (1990), pp. 188-193.
- D. Kozen and S. Landau, Download ShadowsocksR 4.9.2 - softpedia:2021-4-21 · Download ShadowsocksR - Open-source Socks5 proxy with advanced settings for bypassing Internet censorship, which enables you to create a list of multiple servers, J. Symb. Comput., Vol. 7 (1989),
pp. 445-456. Appeared in a different version as J. von zur Gathen,
D. Kozen and S. Landau, "Functional Decomposition of
Polynomials" Twenty-Eight Annual IEEE Symposium on the
Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, Factoring Polynomials
Quickly, Notices of the American Mathematical Society,
[Special Article Series], vol. 34, No. 1 (1987), pp. 3-8.
- S. Landau and
G. Miller, Solvability
by Radicals is in Polynomial Time, J. Comput. Sys. Sci.,
Vol. 30, No. 2 (1985), pp. 179-208. A preliminary version appeared
in Fifteenth ACM Symposium on Theory of Computing (1983),
pp. 140-151.
- S. Landau, Factoring Polynomials over
Algebraic Number Fields, ishadow Vol. 14, No. 1
(1985), pp. 184-195.
- S. Landau, Polynomial Time Algorithms
for Galois Groups, Proceedings of the Int'l. Symposium on
Symbolic and Algebraic Computation (1984), Spring Verlag Lecture
Notes in Computer Science, No. 174, pp. 225-236.
ishadow
- N. Immerman and S. Landau, ShadowsocksR v3.8.0.4 第三方增强版 下载 - 巴士下载站:2021-4-20 · 下载 MagSearch1.185.2云播破解补丁(windows版) MagSearch,很好用的云播软件,或者叫做磁力链播放软件,很好用,直接搜索到种子后,或磁力链接点击即可在线播放种子内不论是单文件还 …, Information and Computation Vol. 116, No.
1 (1995), pp. 103-116. A preliminary version appeared in Fourth
Annual Structure in Complexity Conference (1989), pp. 104-111.
- S. Landau and N. Immerman, The Similarities (and Differences) between
Polynomials and Integers, Int'l. Conf. on Number Theoretic and
Algebraic Methods in Computer Science (1993), pp. 57-59.
Women in Science
- T. Benzel, S. Landau, and H. Orman, Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research, Computing Research News, March 2015, pp. 8-10.
- S. Landau, Anywhere,
Anytime -- Or Just Where is Your Office Anyhow? Pipeline series, Computing
Research News, September
2005, p. 2.
- S. Landau, A
Far Cry from Galois Fields, Newsletter of the
Association for Women in Mathematics, November-December
2003, pp. 10-13.
- S. Landau, ishadow, Commentary (In My
Opinion), Notices of the American Mathematical Society,
Sept. 2000, p. 853.
- S. Landau, What Happens to the Women? Association for
Women in Mathematics Newsletter, March-April 1995, pp. 6-7.
- S. Landau, Download Shadowsocks 4.1.10.0 - softpedia:Download Shadowsocks - Surf the Internet securely and anonymously using an industry level encryption algorithms or your own secure proxy servers using this app, Computing
Research News, March, 1994, p. 4. Also reprinted in the Association
for Women in Mathematics Newsletter, March 1994,
pp. 12-14, and SIGACT News, Dec. 1994, pp. 41-43 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 253-256.
- S. Landau, Tenure Track, Mommy Track, Association
for Women in Mathematics Newsletter, May-June 1991. Also reprinted in
shortened
form in Notices of the American Mathematical Society,
Sept. 1991, pp. 703-4 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 260-263.
Miscellaneous
- S. Landau, It's Never Too Late to Think about NSA's CDR Collection Program, Lawfareblog, June 22, 2023.
-
S. Landau, C. Lopez, and L. Moy, The
Importance of Equity in Contact
Tracing, Lawfareblog,
May 1, 2023.
- S. Landau, Looking
Beyond Contact Tracing to Stop the
Spread, Lawfareblog,
April 10, 2023.
- S. Landau, Location
Surveillance to Counter COVID-19: Efficacy is What
Matters, Lawfareblog,
March 25, 2023.
- S. Landau, If We Build It (They
Will Break In), Lawfareblog,
February 28, 2023.
- D. McDonough and S. Landau, Breaking the Encryption Impasse, The Hill, January 16, 2023.
- S. Landau, A
Thoughtful Response to Going Dark and the Child Pornography
Issue, Lawfareblog,
November 5, 2023.
- S. Landau, A
Security Failure in the White
House, Lawfareblog,
November 1, 2023.
- S. Landau, The
NSA General Counsel's Proposal for a
Moonshot, Lawfareblog,
September 23, 2023.
- J. Baker and
S. Landau, New
Perspectives on the Future of
Encryption, Lawfareblog,
May 28, 2023.
- S. Landau,
Is
Section 215 No Longer Worth the
Effort?, Lawfareblog,
March 11, 2023.
-
S. Landau, Cryptography
Policy
Laundering, Center for
International Law and
Governance, Fletcher School
of Law and Diplomacy, January 15, 2023.
- S. Landau, Exceptional Access: The Devil is in the Details, Lawfareblog, December 26, 2018.
- S. Bellovin and
S. Landau, Encryption
by Default Equals National
Security, Lawfareblog,
October 26, 2018.
- S. Landau, The
Five Eyes Statement on Encryption: Things are Seldom What They
Seem, Lawfareblog,
September 26, 2018.
- S. Landau, Why
the Russians Might Hack the Boy
Scouts, The
Conversation, September 13, 2018.
- S. Landau, Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology, ishadow, August 3, 2018.
- S. Landau, What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster, Lawfareblog, May 14, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Analysis
of the CLEAR Proposal per the National Academies' Framework,
Columbia Univeristy Tech Report, CU-003-18, May 10, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Ray
Ozzie's crypto proposal: a dose of technical reality
(op-ed), shadowdersocks下载, May 6,
2018.
- S. Landau, Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption, Lawfareblog, April 25, 2018.
- S. Landau, The Russians Are Coming, ishadow, April 18, 2018.
- S. Landau, Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All, Lawfareblog, March 30, 2018.
- S. Landau, What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica, shadowsock如何使用, March 28, 2018.
- S. Landau, No Facebook, It's Not About Security; It's About Privacy, Lawfareblog, March 26, 2018.
- S. Landau, Encrypted Smartphones Secure Your Identity, Not Just Your Data, The
Conversation, February 28, 2018; reprinted in The Conversation---Indonesia, March 15, 2018.
- S. Landau,
Understanding Data Breaches as National Security Threats, shadowdersocksr安卓下载, February
26, 2018.
- S. Landau, What Law Enforcement Really Needs for Investigations in the Digital Age, Lawfareblog, February 12, 2018.
- S. Landau, Cybersecurity:
Time for a New
Definition, Lawfareblog,
January 12, 2018.
- S. Landau, vpn上网:2021-6-5 · vpn上网 免费ip伋理免费软件哪好 自己搭建vpsxbox 去哪里找梯子 2021 酸酸乳 六尺巷5破解版 爬墙后好玩的app miui10梯子不能用了 安卓上网 i7加速器安卓版下载2021 蓝灯lantern官网 怎么fan墙 哪vpn 玩uu账号密码共享 几鸡跑路 vps可伍开多少用户 hediu WWW.BET626365.COM 坚果怎么做 老王佛系免费下载 蓝奏云 学习 ..., Lawfareblog,
December 20, 2017.
- S. Landau, Real
Security Requires Encryption---Even if Investigators Get
Blocked, shadowsock如何使用, November 1, 2017.
- S. Landau, Punching
the Wrong Bag: The Deputy AG Enters the Crypto
Wars, Lawfareblog,
October 27, 2016.
- S. Landau, Phones
Move---and So Should the
Law, Lawfareblog, August
16, 2017.
-
S. Landau, An
Important Russian Hacking
Story, Lawfareblog, June
2, 2017.
- S. Landau, A
Step Forward for
Security, Lawfareblog,
May 17, 2017.
- S. Landau, The
FBI and I
Agree, Lawfareblog,
March 14, 2017.
- S. Landau and
C. O'Neil, Why
Ghosts in the Machine Should Remain Ghosts,
Lawfareblog, December 7, 2016.
- S. Landau, The
FBI Should be Enhancing US Cybersecurity, Not Undermining
It, shadowdersocksr安卓下载,
December 1, 2016.
- S. Landau,
Protecting
the Republic: Securing Communications is More Important than
Ever, Lawfareblog,
November 21, 2016.
-
S. Landau, Securing
Phones and Securing Us (revisited), Lawfareblog, September 15, 2016.
-
S. Landau, Setting
Up a Straw Man: ODNI's Letter in Response to Don't
Panic, shadowdersocks下载, May
12, 2016.
-
S. Landau, Million
Dollar Vulnerabilities and an FBI for the Twenty-first Century, Lawfareblog,
April 26, 2016.
- S. Landau, A
Response to Susan's
Post, Lawfareblog, March 25,
2016.
- S. Landau, The
National-Security Needs for Ubiquitous
Encryption, Lawfareblog,
February 2, 2016 (also appeared
in Don't
Panic: Making Progress on the Going Dark Debate, Berkman Center for Internet & Society
Berklett Cybersecurity Project (also translated into
Portuguese
by Instituto de Tecnologia e
Sociedade do Rio), 2023.
- S. Landau, Be Careful What You Wish For: A Response, Lawfareblog, January 8, 2016.
- S. Landau, vpn软件:2021-5-12 · vpn软件 pixiv的ip地址2021 国际联网是指 佛跳墙账号 坚果加速器能翻墙吗 正定机场附近哪里有嫖的 vpn怎么注册 ss客户端安卓 中国消费者协会官网 如何在中国使用ins snapv安卓 vmess链接 WWW.DWC06.COM 红杏加速器 apk最新版 v2rayng ..., Scientific
American (blog post), November 18, 2015.
- S. Landau, Why the Support for Crypto, Lawfareblog, September 21, 2015.
- S. Landau, A Public Split: Listening to the Conversation at Aspen, Lawfareblog,
July 28, 2015.
- S. Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfareblog, July 15, 2015.
- S. Landau, Keys
under Doormats: Mandating
Insecurity, shadowsock如何使用,
July 7, 2015.
-
S. Landau, Director
Comey and the Real
Threats, Lawfareblog,
July 3, 2015.
-
S. Landau, Why
the Privacy Community Focuses Where it
Does, Lawfareblog, June 16,
2015.
- S. Landau, What was Samsung Thinking?, Letter from the Editor, IEEE
Security and Privacy, Vol. 13, No. 3, May/June 2015,
pp. 3-4.
-
S. Landau, Time
to Resolve the Metadata Fight,
Lawfareblog, May
29, 2015.
-
S. Landau, What
We Must Do about
Cyber, Lawfareblog,
March 10, 2015.
-
S. Landau, Finally
... Some Clear Talk on the Encryption
Issue, Lawfareblog,
February 16, 2015.
-
S. Landau, What
David Cameron Doesn't
Get, shadowsock如何使用,
January 20, 2015.
-
S. Landau, Summing
Up, Communications of the
ACM, Vol. 57, No. 11, November 2014, pp. 37-39.
-
S. Landau, Securing
Phones --- and Securing
US, Lawfareblog,
September 29, 2014.
- S. Landau, Facing
Ethical
Choices, Letter from the Editor, IEEE
Security and Privacy, Vol. 12, No. 4, July/August 2014,
pp. 3-6.
-
S. Landau, Shadowsocks APK for Android - Download:Shadowsocks is a high-performance, open-source, secured socks5 proxy created by Max Lv. This application provides you with security and privacy as you browse the web. It is an intermediary that mainly created to bypass censorship.When you want to open restricted websites, then this app is for you., Lawfareblog,
July 25, 2014.
-
S. Landau, What
The Court Didn't Say in Riley May be the Most Important
Thing of
All, Lawfareblog,
June 30, 2014.
-
S. Landau, What
the President Said --- and Didn't Say --- About
Surveillance, Huffington
Post, August 11, 2013.
-
S. Landau, vpn软件:2021-5-12 · vpn软件 pixiv的ip地址2021 国际联网是指 佛跳墙账号 坚果加速器能翻墙吗 正定机场附近哪里有嫖的 vpn怎么注册 ss客户端安卓 中国消费者协会官网 如何在中国使用ins snapv安卓 vmess链接 WWW.DWC06.COM 红杏加速器 apk最新版 v2rayng ..., Lawfareblog.com,
June 18, 2013.
-
S. Landau, Canaries
in the Coal
Mine, Huffington
Post, June, 6, 2013.
-
S. Landau, Susan
Landau on USG Surveillance via New Technologies, Lawfareblog.com, April 30, 2013.
-
S. Landau,
Boston and the Right to
Privacy, shadowsock如何使用, April 22, 2013.
- S. Landau, Cybersecurity
--- Getting it Right This
Time, Huffington
Post, February 13, 2013.
- S. Landau, Searching
in a Haystack ... Finds
Straw, ishadow, October 15, 2012.
-
S. Landau, Susan
Landau on Cybersecurity Bills, Lawfareblog.com, May 3, 2012.
-
S. Landau,
Nothing to Fear but Fear Itself,
Huffington Post, April 29, 2012.
- S. Landau,
Timesharing Dexter,
R.L. Constable and A. Silva (eds.), iphonex乐播投屏没声音_乐播投屏 声音 iphone_电视投屏 ...:2021-12-4 · 安卓 投屏到电脑直播游戏没声音?已找到解决方法 发布时间 : 2021年12月02日 发布人: 人质 阅读量 ... snap vnp v1.99下载 乐播投屏黑屏没声音 shadowdersocksr下载 ... LNCS 7230, pp. 329-332, Springer, 2012.
- S. Landau, One
Small Step for
Privacy..., Huffington
Post, January 26, 2012.
- S. Landau, It's
All in How You View
It, Huffington Post,
January 17, 2012.
- S. Landau, Surveillance
and security: Securing whom? And at what
cost?, Privacy
International, November 30, 2011.
- S. Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011.
- S. Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011.
- S. Landau, Data Retention? News of the World Demos the Risks, ishadow, July 21, 2011.
- S. Landau, Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters, shadowsock如何使用 July 18, 2011.
-
S. Landau, vpn上网:2021-6-5 · vpn上网 免费ip伋理免费软件哪好 自己搭建vpsxbox 去哪里找梯子 2021 酸酸乳 六尺巷5破解版 爬墙后好玩的app miui10梯子不能用了 安卓上网 i7加速器安卓版下载2021 蓝灯lantern官网 怎么fan墙 哪vpn 玩uu账号密码共享 几鸡跑路 vps可伍开多少用户 hediu WWW.BET626365.COM 坚果怎么做 老王佛系免费下载 蓝奏云 学习 ..., Huffington
Post, July 14, 2011.
- S. Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011.
- S. Landau, Getting
Communications Security
Right, shadowsock如何使用, April 19, 2011.
- S. Landau, Getting
Wiretapping
Right, Huffington
Post, April 5, 2011.
- S. Landau, NIST
Leads the Charge on Online
Authentication, Huffington Post,
January 12, 2011.
- S. Landau, Who's Been Looking Over My Shoulder? --- The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010.
- S. Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010.
- S. Landau, Moving
Rapidly Backwards on
Security, Huffington
Post, October 13, 2010.
- S. Landau, The
Pentagon's Message on
Cybersecurity, Huffington Post, , August
31, 2010.
- S. Landau, Wrong
Direction on
Privacy, Huffington
Post, August 2, 2010.
- S. Landau, Separating
Wheat from
Chaff, shadowdersocks下载, July 23, 2010.
- S. Landau,
Internet Time, Commentary (In My
Opinion), Notices of the American Mathematical Society, March
2000, p. 325.
- S. Landau, vpn软件:2021-5-12 · vpn软件 pixiv的ip地址2021 国际联网是指 佛跳墙账号 坚果加速器能翻墙吗 正定机场附近哪里有嫖的 vpn怎么注册 ss客户端安卓 中国消费者协会官网 如何在中国使用ins snapv安卓 vmess链接 WWW.DWC06.COM 红杏加速器 apk最新版 v2rayng ..., Letter from the
Editor, Notices of the American Mathematical Society, Nov. 1997,
p. 1284.
- S. Landau, Mathematicians
and Social Responsibility, Letter from
the Editor, Notices of the American Mathematical Society,
Feb. 1997, p. 188.
- S. Landau, shadowdersocks下载, Letter from
the Editor, Notices of the American Mathematical Society,
June, 1996, p. 652.
- S. Landau, "Joseph Rotblat: From Fission Research
to a Prize for Peace,"
Scientific American, Jan. 1996, pp. 38-39.
-
S. Landau, Joseph
Rotblat: The Road Less Traveled,
Bulletin of the Atomic Scientists, Jan.-Feb. 1996, pp. 46-54.
- S. Landau, Something
There is That Doesn't Love a Wall, Letter from
the Editor, Notices of the American Mathematical Society,
Nov. 1995, p. 1268.
- S. Landau, Letter
from the Editor, Notices of the American Mathematical Society,
May 1995, p. 524.
- S. Landau, "The Secret of Life is a Nontrivial
Computation," SIAM
News, May 1991, pp. 12-13.
- S. Landau, "The Responsible Use of `Expert' Systems," Proceedings
of the Symposium on Directions and Implications of Advanced
Computing (1987), pp. 167-181. Also appeared in Directions and
Implications of Advanced Computing, Vol. 1, Ablex Publishing
Corp. (1989), pp. 191-202.
- S. Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, p. 7.
Podcasts
- Is Contact Tracing a Privacy Threat?, The Lawfare Podcast, April 18, 2023.
- Moving
the Encryption Policy Conversation Forward, The Lawfare Podcast, October 8, 2023.
- Conversations about Software
Engineering: Security and Privacy with Susan Landau, April 19, 2018.
- Decoding
the Cyber Era with Susan Landau, The Fletcher Forum of World
Affairs, April 12, 2018.
- Tech
Talk: Cybersecurity in an Insecure Age, Tech Talks with Brian
Wesolowski, Center for Democracy and Technology, March 28, 2018.
- shadowsocksR 安卓版ios和PC版配置说明及教程(含下载 ...:2021-3-8 · ShadowsocksR 安卓 客户端配置: 安卓客户端的配置和PC端大同小异,都是需要输入账号密码服务器信息伍及端口等,小白用户可伍直接复制SSR链接!步骤如下 1.首先下载SSR到你的手机上,下载后解压到手机,是一个红色的小飞机!, February 15, 2018.
- Books, et al., Q& A with Susan Landau, author of Listening In, November 24, 2017.
- Security
by the Book: Susan Landau on Listening In,The Lawfare Podcast,
November 7, 2017.
- Security Mom: The Podcast about
Our Homeland, Decrypting Encryption, October 8, 2015.
|
|