
Cybersecurity
 H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter,
D. Weitzner, Keys Under Doormats: Mandating insecurity by requiring government access to
all data and communications, MITCSAILTR2015026 (tech report),
July 6, 2015.
 Committee on Responding to Section 5(d) of
Presidential Policy Directive 28: The Feasibility of Software to
Provide Alternatives to Bulk Signals Intelligence Collections,
National Research
Council, Bulk
Collection of Signals Intelligence: Technical Options, National
Academies Press, 2015.
 S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appelate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.

S. Landau, Under
the Radar: NSA's Efforts to Secure PrivateSector Telecommunications
Infrastructure, Journal of
National Security Law and Policy, Vol. 7, No.3 (2014).
 S. Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, pp. 6264.
 S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
 S. Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
pp. 5463.
 S. Bellovin, M. Blaze, S. Clark, and
S. Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
pp. 6272. [Cited in New York
Times editorial,
May 20, 2013.]
 M. Blaze and
S. Landau, The
FBI Needs Hackers, Not
Backdoors, Wired, January
14, 2013.

S. Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), pp. 143.
 C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 16591673.
 S. Landau,
" CALEA  What's Next?'' (opening statement, rejoinder, short
reply) Stewart Baker, Harvey Rishikof, and Bernie Horowitz,
eds., Patriot
Debates II: Contemporary Issues in National Security, American Bar
Association, 2012.
 S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work?  Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possiblebut not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
 S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
 D. D. Clark and
S. Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, pp. 2540.
 D. D. Clark and
S. Landau, The Problem Isn't Attribution: It's MultiStage Attacks, Third
International Workshop on ReArchitecting the Internet, 2010.
 W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 4247,
and Queue, September 2009.
 S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 2526.
 W. Diffie and S. Landau, Brave
New World of Wiretapping, Scientific
American, September 2008, pp. 3339.
 S. Landau, "Security
and Privacy Landscape in Emerging Technologies,''
IEEE
Security and Privacy, Vol. 6, No. 4, August/September 2008,
pp. 7477.
 S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 2433. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
 S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
 S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
 S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409447.
 S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 2633, November/December
2005.
 S. Bellovin, M. Blaze, and S. Landau, The
Real NationalSecurity Needs for VoIP, Inside Risks
180, CACM 48, Nov, 2005, p. 120.
 S. Landau and M. Stytz, "Overview of Cyber Security:
A Crisis of Prioritization", IEEE Security and Privacy,
Vol. 3, No. 3, pp. 911 and sidebar, S. Landau, C. Landwehr, and F.
Schneider, "The PITAC Report: A Brief Analysis,"
p. 10.
 S. Landau, What
Lessons Are We Teaching, Inside Risks 180, CACM 48,
June, 2005, p. 144.
 S. Landau, Security,
Liberty, and Electronic Communications, (invited talk),
in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004,
Springer Verlag, pp. 355372.
 S. Landau, "The Transformation of Global Surveillance," in Bytes,
Bombs, and Bandwidth: Information Technology and Global Security, Social
Science Research Council, 2003, pp. 117131.
 W. Diffie and S. Landau, "Cybersecurity Should
be Kept in Civilian Hands," Boston Globe, August 19, 2002,
pp. E4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO
Reporter, Vol. 10, No. 2, Sept. 2002.
 W. Diffie and S. Landau, The
Export of Cryptography in the 20th Century and the 21st, The
History of Information Security: A Comprehensive Handbook, Karl
De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, pp. 725736. Originally
appeared in Treichel, Jeanie and Mary Holzer (eds.), Sun Microsystems
Laboratories: the First Ten Years, 2001. Sun Labs Tech Report
2001102. A modified version of this paper, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April 2002, pp. 450454.
 W. Diffie and S. Landau, "The Threat of .NET," New
Technology Week, Nov. 5, 2001.
 S. Landau, Cryptography
in Crisis, Commentary (In My Opinion), Notices of the American
Mathematical Society, April 1998, p. 461.
 S. Landau, "Dangerous Increase of FBI Surveillance,"
OpEd, Chicago Tribune, March 6, 1998, p. 23.
 W. Diffie and S. Landau, Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, 1998; updated
and expanded edition, 2007.
 S. Landau and W. Diffie, "Cryptography Control:
FBI Wants It, but Why?", OpEd, Christian Science Monitor, Oct.
6, 1997, p. 19.
 S. Landau, Eavesdropping and Encryption: U.S. Policy
in an International Perspective, Conference on the Impact of the
Internet on Communications Policy (1997), John F. Kennedy School
of Government, Harvard University.
 S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning,
W. Diffie, A. Lauck, D. Miller, P. Neumann and D. Sobel, Codes,
Keys and Conflicts: Issues in U.S. Crypto Policy, ACM Press,
1994. This report, funded by the NSF, was an undertaking of the USACM
Committee on Public Policy. Dr. Stephen Kent, Chief Scientist  Security
Technology, Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security communities, including
members of the government, industry, and academia. A summary of the
report appeared under the title Crypto
Policy Perspectives, in Communications of the ACM, Vol.
37 (Aug. 1994), pp. 115121.
 S. Landau, Zero
Knowledge and the Department of Defense, Notices of
the American Mathematical Society [Special Article
Series], Vol. 35, No. 1 (1988), pp. 512.
 S. Landau, Primes, Codes and the National Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 710.
Cryptography
 H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter,
D. Weitzner, Keys Under Doormats: Mandating insecurity by requiring government access to
all data and communications, MITCSAILTR2015026 (tech report),
July 6, 2015.
 S. Landau, ``NSA and Dual EC_DRBG: Deja Vu All
Over Again?,'' Mathematical Intelligencer, to appear.
 S. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital
signatures," in
William Staples, ed. Encyclopedia of Privacy, Greenwood Press,
2007.
 S. Landau,
Find Me
a Hash, Notices of the American Mathematical Society,
March 2006, pp. 330332; Mathematical Advance in
Translation, Chinese Academy of Sciences, 3 (2010),
pp. 226228.
 S. Landau, RSA
and PublicKey Cryptography; Introduction to Cryptography; Cryptography:
Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves:
Number Theory and Cryptography; Elliptic Curves in Cryptography; Modern
Cryptography, Probabilistic Proofs, and Pseudorandomness; Foundations of
Cryptography: Basic Tools; The Design of Rijndael: AES  the Advanced
Encryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.
3 (2004), pp. 357367.
 S. Landau, Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard, American
Mathematical Monthly, February 2004, pp. 89117.
 W. Diffie and
S. Landau, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April
2002, pp. 450454.
 S. Landau, "Cryptography." Computer Sciences, Ed.,
Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference
USA, pp. 4953.
 S. Landau, Advanced
Encryption Standard Choice is
Rijndael, Notices of the American Mathematical Society, Jan.
2001, p. 38.
 S. Landau, Communications
Security for the TwentyFirst Century: the Advanced Encryption Standard, Notices
of the American Mathematical Society, April 2000, pp. 450459.
Reprinted, in translation, in
"Surveys in Applied and Industrial Mathematics," TVP Publishers
(Moscow), Vol. 7, No. 2 (2000), pp. 259281.
 S. Landau, Standing
the Test of Time: the Data Encryption Standard, Notices of the
American Mathematical Society, March
2000, pp. 341349. Reprinted, in translation, in "Surveys in Applied
and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2
(2000), pp. 240258.
 S. Landau, Designing Cryptography for the New
Century, Communications of the Association for Computing
Machinery, Vol. 43, No. 5, May 2000, pp. 115120.
 S. Landau, Cryptography
in Crisis, Commentary (In My
Opinion), Notices of the American Mathematical Society, April
1998, p. 461.
 Whitfield Diffie and Susan Landau,
Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998).
 S.
Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck,
D. Miller, P. Neumann and D. Sobel, Codes, Keys and
Conflicts: Issues in U.S. Crypto Policy, ACM Press, 1994. This report,
funded by the NSF, was an undertaking of the USACM Committee on Public
Policy. Dr. Stephen Kent, Chief Scientist  Security Technology, Bolt,
Beranek and Newman, chaired the panel, which consisted of senior members
of the cryptography and security communities, including members of the
government, industry, and academia. A summary of the report appeared
under the title Crypto
Policy Perspectives, in Communications of
the ACM, Vol. 37 (Aug. 1994), pp. 115121.
 S. Landau, Some Remarks on
Computing the Square Parts of Integers, Information and Computation, Vol.
78, No. 3 (1988), pp. 246253.
 S. Landau, Zero Knowledge and the Department
of Defense, Notices
of the American Mathematical Society [Special Article Series],
Vol. 35, No. 1 (1988), pp. 512.
 S. Landau, Primes, Codes and the National
Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 710.
Privacy
 S. Landau Control Use of Data
to Protect
Privacy, Science,
Vol. 347, Issue 6221, January 30, 2015.
 S. Landau, Educating
Engineers: Teaching Privacy in a World of Open Doors (prepublication version),
IEEE
Security and Privacy, Vol. 12, No. 3, May/June 2014,
pp. 6670.
 S. Landau, Politics, Love, and
Death in a World of No
Privacy, IEEE
Security and Privacy, Vol. 11, No. 3, May/June 2013,
pp. 1113.
 A. Cavoukian, A. Davidson, M. Hansen, S. Landau, and
A. Slomovic, Privacy: Front and
Center, IEEE
Security and Privacy, Vol. 10, No. 5, September/October 2012,
pp. 510.
 S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). An earlier version appeared
at Workshop on Economics
of Information Security, 2011.
 W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 4247,
and Queue, September 2009.
 S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
 S. Landau,
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy, IEEE
Security and Privacy, Vol. 7, No. 1, January/February
2009, pp. 5862.
 S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 2526.
 W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and Encryption, MIT
Press, 1998 (rev. ed. 2007).
Identity Management
 S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). Earlier version appeared
at Workshop on Economics
of Information Security, 2011.
 S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
 S. Landau and D. Mulligan, I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
IEEE Security
and Privacy, Vol. 6, No. 2, March/April 2008, pp. 1315.
 S. Landau,
Liberty IDWSF Security and Privacy Overview, October 2003.
 S.
Landau and J. Hodges, A
Brief Introduction to Liberty, February 13, 2003.
 G. Ellison,
J. Hodges, and S. Landau, Risks Presented by Single
SignOn Architectures, October 18, 2002.
 G. Ellison, J. Hodges,
and S. Landau, Security and Privacy Concerns
of Internet Single SignOn, September 6, 2002.
Digital Rights Management
 S. Landau, R. Stratulate, and D. Twilleager,
Consumers, Fans, and
Control: What the Games Industry Has to Teach Hollywood
about DRM, CCS Workshops: DRM '06.
 G. Papadopoulos and S. Landau,
"Innovate,
Create, and Compensate!," 19 July 2005.
Symbolic Computation
 S. Landau, "Computations with
Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and
V. Weispfennig (eds.), Computer Algebra Handbook,
Spring Verlag, 2003, pp. 1819.
 S. Landau and N.
Immerman, Embedding
Linkages in Integer Lattices, Algorithmica,
Vol. 43, No. 5, May 2000, pp. 115120. A preliminary version
appeared in MSI Workshop on Computational Geometry,
October, 1994.

S. Landau, Compute
and Conjecture, Commentary (In My Opinion), Notices of the
American Mathematical Society, Feb. 1999, p. 189.
 S. Landau, : Four Different Views, Mathematical
Intelligencer, Vol. 20, No. 4 (Fall 1998), pp. 5560.
 D. Kozen, S. Landau, and R. Zippel,
Decomposition of Algebraic Functions, Journal of Symbolic
Computation, Vol. 22 (1996), pp. 235246. A preliminary version
appeared in Algorithmic Number Theory Symposium (1994).

S. Landau, How
to Tangle with a Nested Radical, Mathematical
Intelligencer, Vol. 16, No. 2 (Spring 1994), pp. 4955.
 S. Landau, Finding Maximal
Subfields, SIGSAM Bulletin, Vol. 27, No. 3 (1993), pp. 48.
 S. Landau, Simplification of Nested
Radicals, SIAM J. of Comput., Vol. 21 (1992), pp. 85110. A
preliminary version appeared in Thirtieth Annual IEEE Symposium
on Foundations of Computer Science (1989), pp. 314319.
 S. Landau, A Note on `Zippel
Denesting,' J. Symb. Comput., Vol. 13 (1992), pp. 4147.
 J. Cremona and S. Landau, Shrinking
Lattice Polyhedra, SIAM J. of Discrete Math, Vol. 3, No. 3
(1990), pp. 338348. A preliminary version appeared
in Proceedings of the First ACMSIAM Symposium on Discrete
Algorithms (1990), pp. 188193.
 D. Kozen and S. Landau, Polynomial
Decomposition Algorithms, J. Symb. Comput., Vol. 7 (1989),
pp. 445456. Appeared in a different version as J. von zur Gathen,
D. Kozen and S. Landau, "Functional Decomposition of
Polynomials" TwentyEight Annual IEEE Symposium on the
Foundations of Computer Science (1989), pp. 314319.
 S. Landau, Factoring Polynomials
Quickly, Notices of the American Mathematical Society,
[Special Article Series], vol. 34, No. 1 (1987), pp. 38.
 S. Landau and G. Miller, Solvability
by Radicals is in Polynomial Time, J. Comput. Sys. Sci.,
Vol. 30, No. 2 (1985), pp. 179208. A preliminary version appeared
in Fifteenth ACM Symposium on Theory of Computing (1983),
pp. 140151.
 S. Landau, Factoring Polynomials over
Algebraic Number Fields, SIAM J. of Comput., Vol. 14, No. 1
(1985), pp. 184195.
 S. Landau, Polynomial Time Algorithms
for Galois Groups, Proceedings of the Int'l. Symposium on
Symbolic and Algebraic Computation (1984), Spring Verlag Lecture
Notes in Computer Science, No. 174, pp. 225236.
Complexity
 N. Immerman and S. Landau, The Complexity of Iterated
Multiplication, Information and Computation Vol. 116, No.
1 (1995), pp. 103116. A preliminary version appeared in Fourth
Annual Structure in Complexity Conference (1989), pp. 104111.
 S. Landau and N. Immerman, The Similarities (and Differences) between
Polynomials and Integers, Int'l. Conf. on Number Theoretic and
Algebraic Methods in Computer Science (1993), pp. 5759.
Women in Science
 T. Benzel, S. Landau, and H. Orman, Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research, Computing Research News, March 2015, pp. 810.
 S. Landau, Anywhere,
Anytime  Or Just Where is Your Office Anyhow? Pipeline series, Computing
Research News, September
2005, p. 2.
 S. Landau, A Far Cry from Galois Fields, Newsletter
of the Association for Women in Mathematics, NovemberDecember
2003, pp. 1113.
 S. Landau,
Time to Move Mountains, Commentary (In My
Opinion), Notices of the American Mathematical Society,
Sept. 2000, p. 853.
 S. Landau, Universities and the TwoBody Problem, Computing
Research News, March, 1994, p. 4. Also reprinted in the Association
for Women in Mathematics Newsletter, March 1994,
pp. 1214, and SIGACT News, Dec. 1994, pp. 4143 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 253256.
 S. Landau, Tenure Track, Mommy Track, Association
for Women in Mathematics Newsletter, MayJune 1991. Also reprinted in
shortened
form in Notices of the American Mathematical Society,
Sept. 1991, pp. 7034 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 260263.
Miscellaneous
 S. Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfareblog, July 15, 2015.
 S. Landau, Keys Under Doors: Mandating Insecurity, Lawfareblog, July 7, 2015.

S. Landau, Director
Comey and the Real
Threats, Lawfareblog,
July 3, 2015.

S. Landau, Why
the Privacy Community Focuses Where it
Does, Lawfareblog, June 16,
2015.
 S. Landau, What was Samsung Thinking?, Letter from the Editor, IEEE
Security and Privacy, Vol. 13, No. 3, May/June 2015,
pp. 34.

S. Landau, Time
to Resolve the Metadata Fight,
Lawfareblog, May
29, 2015.

S. Landau, What
We Must Do about
Cyber, Lawfareblog,
March 10, 2015.

S. Landau, Finally
... Some Clear Talk on the Encryption
Issue, Lawfareblog,
February 16, 2015.

S.Landau, What
David Cameron Doesn't
Get, Lawfareblog,
January 20, 2015.

S. Landau, Summing
Up, Communications of the
ACM, Vol. 57, No. 11, November 2014, pp. 3739.

S.Landau, Securing
Phones  and Securing
US, Lawfareblog,
September 29, 2014.
 S. Landau, Facing
Ethical
Choices, Letter from the Editor, IEEE
Security and Privacy, Vol. 12, No. 4, July/August 2014,
pp. 36.

S.Landau, On
NSA's Subversion of NIST's
Algorithm, Lawfareblog,
July 25, 2014.

S.Landau, What
The Court Didn't Say in Riley May be the Most Important
Thing of
All, Lawfareblog,
June 30, 2014.

S. Landau, What
the President Said  and Didn't Say  About
Surveillance, Huffington
Post, August 11, 2013.

S. Landau, Susan
Landau on
Minimization, Lawfareblog.com,
June 18, 2013.

S. Landau, Canaries
in the Coal
Mine, Huffington
Post, June, 6, 2013.

S. Landau Susan
Landau on USG Surveillance via New Technologies, Lawfareblog.com, April 30, 2013.

S. Landau,
Boston and the Right to
Privacy, Huffington
Post, April 22, 2013.
 S. Landau, Cybersecurity
 Getting it Right This
Time, Huffington
Post, February 13, 2013.
 S. Landau, Searching
in a Haystack ... Finds
Straw, Huffington
Post, October 15, 2012.

S. Landau, Susan
Landau on Cybersecurity Bills, Lawfareblog.com, May 3, 2012.

S. Landau,
Nothing to Fear but Fear Itself,
Huffington Post, April 29, 2012.
 S. Landau
Timesharing Dexter,
R.L. Constable and A. Silva (eds.), Logic and Program
Semantics  Essays Dedicated to Dexter Kozen on the Occasion of
His 60th Birthday, LNCS 7230, pp. 329332, Springer, 2012.
 S. Landau, One
Small Step for
Privacy..., Huffington
Post, January 26, 2012.
 S. Landau, It's
All in How You View
It, Huffington Post,
January 17, 2012.
 S. Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011.
 S. Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011.
 S. Landau, Data Retention? News of the World Demos the Risks, Huffington Post, July 21, 2011.
 S. Landau, Mr. Murdoch and Mr. Brown: A RealLife Example of Why Privacy Matters, Huffington Post July 18, 2011.

S. Landau, Where
Have All the Wiretap Reports
Gone?, Huffington
Post, July 14, 2011.
 S. Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011.
 S. Landau, Getting
Communications Security
Right, Huffington
Post, April 19, 2011.
 S. Landau, Getting
Wiretapping
Right, Huffington
Post, April 5, 2011.
 S. Landau, NIST
Leads the Charge on Online
Authentication, Huffington Post,
January 12, 2011.
 S. Landau, Who's Been Looking Over My Shoulder?  The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010.
 S. Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010.
 S. Landau, Moving
Rapidly Backwards on
Security, Huffington
Post, October 13, 2010.
 S. Landau, The
Pentagon's Message on
Cybersecurity, Huffington Post, , August
31, 2010.
 S. Landau, Wrong
Direction on
Privacy, Huffington
Post, August 2, 2010.
 S. Landau, Separating
Wheat from
Chaff, Huffington
Post, July 23, 2010.
 S. Landau,
Internet Time, Commentary (In My
Opinion), Notices of the American Mathematical Society, March
2000, p. 325.
 S. Landau, The
Myth of the Young Mathematician, Letter from the
Editor, Notices of the American Mathematical Society, Nov. 1997,
p. 1284.
 S. Landau, Mathematicians
and Social Responsibility, Letter from
the Editor, Notices of the American Mathematical Society,
Feb. 1997, p. 188.
 S. Landau, Rising
to the Challenge, Letter from
the Editor, Notices of the American Mathematical Society,
June, 1996, p. 652.
 S. Landau, "Joseph Rotblat: From Fission Research
to a Prize for Peace,"
Scientific American, Jan. 1996, pp. 3839.
 S. Landau, Joseph
Rotblat: The Road Less Traveled,
Bulletin of the Atomic Scientists, Jan.Feb. 1996, pp. 4654.
 S. Landau, Something
There is That Doesn't Love a Wall, Letter from
the Editor, Notices of the American Mathematical Society,
Nov. 1995, p. 1268.
 S. Landau, Letter
from the Editor, Notices of the American Mathematical Society,
May 1995, p. 524.
 S. Landau, "The Secret of Life is a Nontrivial
Computation," SIAM
News, May 1991, pp. 1213.
 S. Landau, "The Responsible Use of `Expert' Systems," Proceedings
of the Symposium on Directions and Implications of Advanced
Computing (1987), pp. 167181. Also appeared in Directions and
Implications of Advanced Computing, Vol. 1, Ablex Publishing
Corp. (1989), pp. 191202.
 S. Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, p. 7.

