|
Bio
|
Internas |
Passa sumo |
|
Publications
|
Internas |
Passa sumo |
|
Teaching
|
Internas |
Passa sumo |
|
Activities
|
Internas |
Passa sumo |
|
Honors/Awards
|
Internas |
Passa sumo |
|
Contact
|
Internas |
Passa sumo |
|
The Fletcher School
|
Externas |
Passa sumo |
|
School
of Engineering
|
Externas |
Passa sumo |
|
Department of Computer
Science
|
Externas |
Passa sumo |
|
Tufts University
|
Externas |
Passa sumo |
|
University College
London
|
Externas |
Passa sumo |
|
People
Count: Contact-Tracing Apps and Public Health
|
Externas |
Passa sumo |
|
Listening
In: Cybersecurity in an Insecure Age
|
Externas |
Passa sumo |
|
Surveillance
or Security? The Risks Posed by New Wiretapping Technologies
|
Externas |
Passa sumo |
|
Privacy
on the Line: The Politics of Wiretapping and Encryption
|
Externas |
Passa sumo |
|
2008 Women of Vision Social Impact Award
|
Externas |
Passa sumo |
|
Radcliffe Institute for
Advanced Study
|
Externas |
Passa sumo |
|
Guggenheim
fellow
|
Externas |
Passa sumo |
|
Cybersecurity
Hall of Fame
|
Externas |
Passa sumo |
|
Information System Security
Association Hall of Fame
|
Externas |
Passa sumo |
|
American Association for the
Advancement of Science
|
Externas |
Passa sumo |
|
Association for Computing
Machinery
|
Externas |
Passa sumo |
|
testimony
|
Externas |
Passa sumo |
|
Surveillance
Studies Book Prize
|
Externas |
Passa sumo |
|
Center for
International Law and Governance
|
Externas |
Passa sumo |
|
Google
|
Externas |
Passa sumo |
|
Sun Microsystems
|
Externas |
Passa sumo |
|
Hampshire College Summer Studies
in Mathematics
|
Externas |
Passa sumo |
|
Supporting
a National Treasure
|
Internas |
Passa sumo |
|
Will
'17 be the Year of the Pig?
|
Externas |
Passa sumo |
|
Forum
on Cyber Resilience
|
Externas |
Passa sumo |
|
-
|
Externas |
Passa sumo |
|
Center for
Democracy and Technology Advisory Council
|
Externas |
Passa sumo |
|
Journal of
Cybersecurity
|
Externas |
Passa sumo |
|
Lawfareblog
|
Externas |
Passa sumo |
|
Computer
Science
and Telecommunications Board
|
Externas |
Passa sumo |
|
advisory
committee
|
Externas |
Passa sumo |
|
Directorate
for Computer and Information Science and Engineering
|
Externas |
Passa sumo |
|
Information
Security and Privacy Advisory Board
|
Externas |
Passa sumo |
|
IEEE
Security and Privacy
|
Externas |
Passa sumo |
|
Communications of the ACM
|
Externas |
Passa sumo |
|
Notices of the
American Mathematical Society
|
Externas |
Passa sumo |
|
meetings
|
Externas |
Passa sumo |
|
researcHers
|
Externas |
Passa sumo |
|
ACM Athena
Lectureship
|
Externas |
Passa sumo |
|
MIT
Celebration of Women in Math
|
Externas |
Passa sumo |
|
ACM-W
|
Externas |
Passa sumo |
|
Computing Research Association
Committee on the Status of Women in Computing Research (CRAW)
|
Externas |
Passa sumo |
|
[top]
|
Internas |
Passa sumo |
|
Moving the Encryption Policy Debate Forward
|
Externas |
Passa sumo |
|
Decrypting
the Encryption Debate: A Framework for Decisionmakers
|
Externas |
Passa sumo |
|
Listening
In: Cybersecurity in an Insecure
Age
|
Externas |
Passa sumo |
|
Yale University
Press
|
Externas |
Passa sumo |
|
discussion
|
Externas |
Passa sumo |
|
interview
|
Externas |
Passa sumo |
|
The
Real Security Risks of the iPhone
Case
|
Externas |
Passa sumo |
|
Science
|
Externas |
Passa sumo |
|
Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy"
|
Externas |
Passa sumo |
|
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications
|
Externas |
Passa sumo |
|
Journal
of Cybersecurity
|
Externas |
Passa sumo |
|
Mathematical Intelligencer
|
Externas |
Passa sumo |
|
Testimony
|
Externas |
Passa sumo |
|
The
Export of Cryptography in the 20th Century and the 21st
|
Internas |
Passa sumo |
|
September
11th Did Not Change Cryptography Policy
|
Externas |
Passa sumo |
|
Find Me
a Hash
|
Externas |
Passa sumo |
|
Bulletin of the American Mathematical Society,
|
Externas |
Passa sumo |
|
Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard
|
Internas |
Passa sumo |
|
Advanced
Encryption Standard Choice is
Rijndael
|
Externas |
Passa sumo |
|
Communications
Security for the Twenty-First Century: the Advanced Encryption Standard
|
Externas |
Passa sumo |
|
Standing
the Test of Time: the Data Encryption Standard
|
Externas |
Passa sumo |
|
Designing Cryptography for the New
Century,
|
Externas |
Passa sumo |
|
Cryptography
in Crisis
|
Externas |
Passa sumo |
|
Codes,
Keys, and Conflicts: Issues in U.S. Crypto Policy
|
Externas |
Passa sumo |
|
Some Remarks on
Computing the Square Parts of Integers
|
Externas |
Passa sumo |
|
Zero Knowledge and the Department
of Defense
|
Internas |
Passa sumo |
|
Primes, Codes and the National
Security Agency
|
Internas |
Passa sumo |
|
Categorizing
Uses of Communications Metadata: Systematizing Knowledge and Presenting
a Path for Privacy
|
Externas |
Passa sumo |
|
New
Security Paradigms Workshop
|
Externas |
Passa sumo |
|
Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?
|
Externas |
Passa sumo |
|
Harvard National Security Journal
|
Externas |
Passa sumo |
|
If It Isn't Efficacious, Don't Do It
|
Externas |
Passa sumo |
|
European Data Protection Law Review
|
Externas |
Passa sumo |
|
Comments
submitted to the NTIA request for comments on privacy
|
Externas |
Passa sumo |
|
Is
it Legal? Is it Right? The Can and Should of Use
|
Externas |
Passa sumo |
|
IEEE Security and Privacy
|
Externas |
Passa sumo |
|
Transactional
information is remarkably
revelatory
|
Externas |
Passa sumo |
|
Proceedings of the
National Academy of Sciences
|
Externas |
Passa sumo |
|
Choices: Privacy & Surveillance in a Once & Future Internet
|
Externas |
Passa sumo |
|
Daedulus
|
Externas |
Passa sumo |
|
Control Use of Data
to Protect
Privacy
|
Externas |
Passa sumo |
|
Educating
Engineers: Teaching Privacy in a World of Open Doors
|
Internas |
Passa sumo |
|
Politics, Love, and
Death in a World of No
Privacy
|
Externas |
Passa sumo |
|
Privacy: Front and
Center
|
Externas |
Passa sumo |
|
Economic
Tussles in Federated Identity
Management,
|
Externas |
Passa sumo |
|
First Monday
|
Externas |
Passa sumo |
|
Workshop on Economics
of Information Security,
|
Externas |
Passa sumo |
|
Communications
Surveillance: Privacy and Security at Risk,
|
Externas |
Passa sumo |
|
Achieving Privacy in a
Federated Identity Management System
|
Internas |
Passa sumo |
|
Financial Cryptography and Data Security
'09.
|
Externas |
Passa sumo |
|
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy
|
Internas |
Passa sumo |
|
IEEE
Security and Privacy,
|
Externas |
Passa sumo |
|
Privacy and
Security: A Multidimensional Problem,
|
Internas |
Passa sumo |
|
Russia's
Hybrid Warriors Got the White House, Now They're Coming for America's
Town Halls
|
Externas |
Passa sumo |
|
Foreign Policy
|
Internas |
Passa sumo |
|
Limiting
the Undesired Impact of Cyber Weapons: Technical Requirements and
Policy
Implications
|
Externas |
Passa sumo |
|
Bytes,
Bombs, and Spies: The Strategic Dimensions of Offensive Cyber
Operations
|
Externas |
Passa sumo |
|
Harvard Journal of Law
and Technology
|
Externas |
Passa sumo |
|
The
Government Will Soon Be Able to Legally Hack
Anyone
|
Externas |
Passa sumo |
|
Wired
|
Externas |
Passa sumo |
|
Insecure
Surveillance: Technical Issues with Remote Computer
Searches
|
Externas |
Passa sumo |
|
Computer
|
Externas |
Passa sumo |
|
Computing Now
|
Externas |
Passa sumo |
|
Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy"
|
Externas |
Passa sumo |
|
Perspective:
Cybersurveillance and the New Frontier of
Deterrence
|
Externas |
Passa sumo |
|
Current
History
|
Externas |
Passa sumo |
|
Communications
of the ACM
|
Externas |
Passa sumo |
|
Bulk
Collection of Signals Intelligence: Technical Options
|
Externas |
Passa sumo |
|
Comments on Proposed
Search
Rules
|
Internas |
Passa sumo |
|
Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure
|
Externas |
Passa sumo |
|
Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure
|
Externas |
Passa sumo |
|
Journal of National
Security Law and Policy
|
Externas |
Passa sumo |
|
Intelligence
|
Externas |
Passa sumo |
|
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
|
Externas |
Passa sumo |
|
Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations,
|
Externas |
Passa sumo |
|
Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet
|
Externas |
Passa sumo |
|
Northwestern Journal of Technology and Intellectual Property
|
Externas |
Passa sumo |
|
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
|
Externas |
Passa sumo |
|
CALEA
II: Risks of Wiretap Modifications to Endpoints"
|
Externas |
Passa sumo |
|
editorial
|
Externas |
Passa sumo |
|
The
FBI Needs Hackers, Not
Backdoors
|
Externas |
Passa sumo |
|
The
Large Immortal Machine and The Ticking Time
Bomb
|
Externas |
Passa sumo |
|
Journal of Telecommunications
and High Technology Law
|
Externas |
Passa sumo |
|
Privacy
and Cybersecurity: The Next 100
Years
|
Externas |
Passa sumo |
|
Proceedings of the IEEE
|
Externas |
Passa sumo |
|
Can
It Really Work? --- Problems with Extending EINSTEIN to Critical
Infrastructure
|
Externas |
Passa sumo |
|
Harvard National Security
Journal
|
Externas |
Passa sumo |
|
As simple as possible---but not more so,
|
Externas |
Passa sumo |
|
Communications of the ACM
|
Externas |
Passa sumo |
|
Testimony
|
Externas |
Passa sumo |
|
Untangling
Attribution,
|
Externas |
Passa sumo |
|
Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy,
|
Externas |
Passa sumo |
|
The Problem Isn't Attribution: It's Multi-Stage Attacks
|
Externas |
Passa sumo |
|
Cybersecurity
Activities at NIST's Information Technology Laboratory
|
Externas |
Passa sumo |
|
Brave
New World of Wiretapping
|
Externas |
Passa sumo |
|
Security
and Privacy Landscape in Emerging Technologies,
|
Internas |
Passa sumo |
|
IEEE
Security and Privacy,
|
Externas |
Passa sumo |
|
Internal
Risks, External Surveillance
|
Internas |
Passa sumo |
|
A
Gateway for Hackers: The Security Threat in the New Wiretapping Law
|
Externas |
Passa sumo |
|
National Security
on the Line
|
Internas |
Passa sumo |
|
Security, Wiretapping,
and the Internet
|
Internas |
Passa sumo |
|
The
Real National-Security Needs for VoIP
|
Internas |
Passa sumo |
|
What
Lessons Are We Teaching
|
Internas |
Passa sumo |
|
Security,
Liberty, and Electronic Communications
|
Internas |
Passa sumo |
|
Cryptography Control:
FBI Wants It, but Why?
|
Externas |
Passa sumo |
|
Crypto
Policy Perspectives
|
Externas |
Passa sumo |
|
Seeking
the Source: Criminal Defendants' Constitutional Right to Source
Code
|
Externas |
Passa sumo |
|
I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
|
Internas |
Passa sumo |
|
Liberty ID-WSF Security and Privacy Overview
|
Internas |
Passa sumo |
|
A
Brief Introduction to Liberty,
|
Internas |
Passa sumo |
|
Risks Presented by Single
Sign-On Architectures,
|
Internas |
Passa sumo |
|
Security and Privacy Concerns
of Internet Single Sign-On,
|
Internas |
Passa sumo |
|
Consumers, Fans, and
Control: What the Games Industry Has to Teach Hollywood
about DRM
|
Internas |
Passa sumo |
|
Innovate,
Create---and Compensate!
|
Externas |
Passa sumo |
|
Embedding
Linkages in Integer Lattices
|
Externas |
Passa sumo |
|
Compute
and Conjecture
|
Externas |
Passa sumo |
|
Decomposition of Algebraic Functions
|
Externas |
Passa sumo |
|
How
to Tangle with a Nested Radical
|
Externas |
Passa sumo |
|
Finding Maximal
Subfields
|
Externas |
Passa sumo |
|
Simplification of Nested
Radicals
|
Externas |
Passa sumo |
|
preliminary version
|
Externas |
Passa sumo |
|
Shrinking
Lattice Polyhedra
|
Externas |
Passa sumo |
|
Polynomial
Decomposition Algorithms
|
Externas |
Passa sumo |
|
Solvability
by Radicals is in Polynomial Time
|
Externas |
Passa sumo |
|
Factoring Polynomials over
Algebraic Number Fields
|
Externas |
Passa sumo |
|
Polynomial Time Algorithms
for Galois Groups
|
Externas |
Passa sumo |
|
The Complexity of Iterated
Multiplication
|
Externas |
Passa sumo |
|
Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research
|
Externas |
Passa sumo |
|
Computing Research News
|
Externas |
Passa sumo |
|
Anywhere,
Anytime -- Or Just Where is Your Office Anyhow?
|
Externas |
Passa sumo |
|
A
Far Cry from Galois Fields
|
Externas |
Passa sumo |
|
Time to Move Mountains
|
Externas |
Passa sumo |
|
What Happens to the Women?
|
Externas |
Passa sumo |
|
Universities and the Two-Body Problem
|
Internas |
Passa sumo |
|
Complexities:
Women in Mathematics
|
Externas |
Passa sumo |
|
Tenure Track, Mommy Track
|
Internas |
Passa sumo |
|
shortened
form
|
Externas |
Passa sumo |
|
Lessons
from Contact-Tracing and Exposure-Notification
Apps
|
Externas |
Passa sumo |
|
Lawfareblog
|
Externas |
Passa sumo |
|
Contact-tracing
apps have serious physical, biological
limitations
|
Externas |
Passa sumo |
|
Big Think
|
Externas |
Passa sumo |
|
Contact-Tracing
Apps: What's Needed to Be an Effective Public Health
Tool
|
Externas |
Passa sumo |
|
Law
Enforcement is Accessing Locked Devices Quite Well, Thank
You
|
Externas |
Passa sumo |
|
It's Never Too Late to Think about NSA's CDR Collection Program
|
Externas |
Passa sumo |
|
The
Importance of Equity in Contact
Tracing
|
Externas |
Passa sumo |
|
Looking
Beyond Contact Tracing to Stop the
Spread
|
Externas |
Passa sumo |
|
Location
Surveillance to Counter COVID-19: Efficacy is What
Matters
|
Externas |
Passa sumo |
|
If We Build It (They
Will Break In)
|
Externas |
Passa sumo |
|
Breaking the Encryption Impasse
|
Externas |
Passa sumo |
|
The Hill
|
Externas |
Passa sumo |
|
A
Thoughtful Response to Going Dark and the Child Pornography
Issue
|
Externas |
Passa sumo |
|
A
Security Failure in the White
House
|
Externas |
Passa sumo |
|
The
NSA General Counsel's Proposal for a
Moonshot
|
Externas |
Passa sumo |
|
New
Perspectives on the Future of
Encryption
|
Externas |
Passa sumo |
|
Is
Section 215 No Longer Worth the
Effort?
|
Externas |
Passa sumo |
|
Cryptography
Policy
Laundering
|
Externas |
Passa sumo |
|
Exceptional Access: The Devil is in the Details
|
Externas |
Passa sumo |
|
Encryption
by Default Equals National
Security
|
Externas |
Passa sumo |
|
The
Five Eyes Statement on Encryption: Things are Seldom What They
Seem
|
Externas |
Passa sumo |
|
Why
the Russians Might Hack the Boy
Scouts
|
Externas |
Passa sumo |
|
The
Conversation
|
Externas |
Passa sumo |
|
Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology
|
Externas |
Passa sumo |
|
What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster
|
Externas |
Passa sumo |
|
Analysis
of the CLEAR Proposal per the National Academies' Framework
|
Externas |
Passa sumo |
|
Ray
Ozzie's crypto proposal: a dose of technical reality
|
Externas |
Passa sumo |
|
Ars Technica
|
Externas |
Passa sumo |
|
Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption
|
Externas |
Passa sumo |
|
The Russians Are Coming
|
Externas |
Passa sumo |
|
Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All
|
Externas |
Passa sumo |
|
What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica
|
Externas |
Passa sumo |
|
Blog@ACM
|
Externas |
Passa sumo |
|
No Facebook, It's Not About Security; It's About Privacy
|
Externas |
Passa sumo |
|
Encrypted Smartphones Secure Your Identity, Not Just Your Data
|
Externas |
Passa sumo |
|
The
Conversation
|
Externas |
Passa sumo |
|
reprinted
|
Externas |
Passa sumo |
|
Understanding Data Breaches as National Security Threats
|
Externas |
Passa sumo |
|
What Law Enforcement Really Needs for Investigations in the Digital Age
|
Externas |
Passa sumo |
|
Cybersecurity:
Time for a New
Definition
|
Externas |
Passa sumo |
|
Using
Threat Modeling to Secure
America
|
Externas |
Passa sumo |
|
Real
Security Requires Encryption---Even if Investigators Get
Blocked
|
Externas |
Passa sumo |
|
Punching
the Wrong Bag: The Deputy AG Enters the Crypto
Wars
|
Externas |
Passa sumo |
|
Phones
Move---and So Should the
Law
|
Externas |
Passa sumo |
|
An
Important Russian Hacking
Story
|
Externas |
Passa sumo |
|
A
Step Forward for
Security
|
Externas |
Passa sumo |
|
The
FBI and I
Agree
|
Externas |
Passa sumo |
|
Why
Ghosts in the Machine Should Remain Ghosts
|
Externas |
Passa sumo |
|
The
FBI Should be Enhancing US Cybersecurity, Not Undermining
It
|
Externas |
Passa sumo |
|
Protecting
the Republic: Securing Communications is More Important than
Ever
|
Externas |
Passa sumo |
|
Securing
Phones and Securing Us (revisited)
|
Externas |
Passa sumo |
|
Setting
Up a Straw Man: ODNI's Letter in Response to Don't
Panic
|
Externas |
Passa sumo |
|
Million
Dollar Vulnerabilities and an FBI for the Twenty-first Century
|
Externas |
Passa sumo |
|
Lawfareblog
|
Externas |
Passa sumo |
|
A
Response to Susan's
Post
|
Externas |
Passa sumo |
|
The
National-Security Needs for Ubiquitous
Encryption
|
Externas |
Passa sumo |
|
Don't
Panic: Making Progress on the Going Dark Debate
|
Externas |
Passa sumo |
|
Portuguese
|
Externas |
Passa sumo |
|
Instituto de Tecnologia e
Sociedade do Rio
|
Externas |
Passa sumo |
|
Be Careful What You Wish For: A Response
|
Externas |
Passa sumo |
|
The
Encryption Wars: Everything has Changed, and Nothing has
Changed
|
Externas |
Passa sumo |
|
Scientific
American
|
Externas |
Passa sumo |
|
Why the Support for Crypto
|
Externas |
Passa sumo |
|
A Public Split: Listening to the Conversation at Aspen
|
Externas |
Passa sumo |
|
Thoughts on Encryption and Going Dark: Counterpart
|
Externas |
Passa sumo |
|
Keys
under Doormats: Mandating
Insecurity
|
Externas |
Passa sumo |
|
Director
Comey and the Real
Threats
|
Externas |
Passa sumo |
|
Why
the Privacy Community Focuses Where it
Does
|
Externas |
Passa sumo |
|
What was Samsung Thinking?
|
Externas |
Passa sumo |
|
Time
to Resolve the Metadata Fight
|
Externas |
Passa sumo |
|
What
We Must Do about
Cyber
|
Externas |
Passa sumo |
|
Finally
... Some Clear Talk on the Encryption
Issue
|
Externas |
Passa sumo |
|
What
David Cameron Doesn't
Get
|
Externas |
Passa sumo |
|
Summing
Up
|
Externas |
Passa sumo |
|
Securing
Phones --- and Securing
US
|
Externas |
Passa sumo |
|
Facing
Ethical
Choices
|
Externas |
Passa sumo |
|
On
NSA's Subversion of NIST's
Algorithm
|
Externas |
Passa sumo |
|
What
the President Said --- and Didn't Say --- About
Surveillance
|
Externas |
Passa sumo |
|
Huffington
Post
|
Externas |
Passa sumo |
|
Susan
Landau on
Minimization
|
Externas |
Passa sumo |
|
Canaries
in the Coal
Mine
|
Externas |
Passa sumo |
|
Susan
Landau on USG Surveillance via New Technologies
|
Externas |
Passa sumo |
|
Boston and the Right to
Privacy
|
Externas |
Passa sumo |
|
Cybersecurity
--- Getting it Right This
Time
|
Externas |
Passa sumo |
|
Searching
in a Haystack ... Finds
Straw
|
Externas |
Passa sumo |
|
Susan
Landau on Cybersecurity Bills
|
Externas |
Passa sumo |
|
Nothing to Fear but Fear Itself
|
Externas |
Passa sumo |
|
Timesharing Dexter
|
Internas |
Passa sumo |
|
One
Small Step for
Privacy...
|
Externas |
Passa sumo |
|
It's
All in How You View
It
|
Externas |
Passa sumo |
|
Surveillance
and security: Securing whom? And at what
cost?
|
Externas |
Passa sumo |
|
Privacy
International
|
Externas |
Passa sumo |
|
Hollywood and the Internet: Time for the Sequel
|
Externas |
Passa sumo |
|
Who Knows Where I Am? What Do They Do with the Information?
|
Externas |
Passa sumo |
|
Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters
|
Externas |
Passa sumo |
|
Huffington Post
|
Externas |
Passa sumo |
|
Where
Have All the Wiretap Reports
Gone?
|
Externas |
Passa sumo |
|
Privacy, Online Identity Solutions, and Making Money: Pick Three?
|
Externas |
Passa sumo |
|
Getting
Communications Security
Right
|
Externas |
Passa sumo |
|
Getting
Wiretapping
Right
|
Externas |
Passa sumo |
|
NIST
Leads the Charge on Online
Authentication
|
Externas |
Passa sumo |
|
The FBI Wiretap Plan: Upsetting the Security Equation
|
Externas |
Passa sumo |
|
Moving
Rapidly Backwards on
Security
|
Externas |
Passa sumo |
|
The
Pentagon's Message on
Cybersecurity
|
Externas |
Passa sumo |
|
Huffington Post
|
Externas |
Passa sumo |
|
Wrong
Direction on
Privacy
|
Externas |
Passa sumo |
|
Separating
Wheat from
Chaff
|
Externas |
Passa sumo |
|
Internet Time
|
Externas |
Passa sumo |
|
The
Myth of the Young Mathematician
|
Externas |
Passa sumo |
|
Mathematicians
and Social Responsibility
|
Externas |
Passa sumo |
|
Rising
to the Challenge
|
Externas |
Passa sumo |
|
Joseph
Rotblat: The Road Less Traveled
|
Externas |
Passa sumo |
|
Something
There is That Doesn't Love a Wall
|
Internas |
Passa sumo |
|
Letter
from the Editor
|
Internas |
Passa sumo |
|
What's Doing in Ithaca, New York,
|
Externas |
Passa sumo |
|
New York Times,
|
Externas |
Passa sumo |
|
The
NBS Computerized Carpool Matching System: Users' Guide
|
Externas |
Passa sumo |
|
Is Contact Tracing a Privacy Threat?
|
Externas |
Passa sumo |
|
Moving
the Encryption Policy Conversation Forward
|
Externas |
Passa sumo |
|
Conversations about Software
Engineering: Security and Privacy with Susan Landau
|
Externas |
Passa sumo |
|
Decoding
the Cyber Era with Susan Landau
|
Externas |
Passa sumo |
|
Tech
Talk: Cybersecurity in an Insecure Age
|
Externas |
Passa sumo |
|
The Cyberlaw Podcast: Interview with Susan Landau
|
Externas |
Passa sumo |
|
Security
by the Book: Susan Landau on Listening In
|
Externas |
Passa sumo |
|
Security Mom: The Podcast about
Our Homeland, Decrypting Encryption
|
Externas |
Passa sumo |
|
Division
Committee of the Division of Engineering and Physical Sciences,
National Academies of Sciences, Engineering, and Medicine
|
Externas |
Passa sumo |
|
Center for
Strategic and International Studies
|
Externas |
Passa sumo |
|
Information Security and Privacy
Advisory Board
|
Externas |
Passa sumo |
|
Notices of the
American Mathematical Society
|
Externas |
Passa sumo |
|
Committee on International Security Studies
|
Externas |
Passa sumo |
|
American Academy of Arts and
Sciences
|
Externas |
Passa sumo |
|
Encryption Working Group
|
Externas |
Passa sumo |
|
Carnegie Endowment for International Peace
|
Externas |
Passa sumo |
|
Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Trade Offs
|
Externas |
Passa sumo |
|
Workshop
on Encryption and Mechanisms for Authorized Government Access to
Plaintext
|
Externas |
Passa sumo |
|
ACM Policy Award Committee
|
Externas |
Passa sumo |
|
report
|
Externas |
Passa sumo |
|
Privacy
Research and Best Practices: Summary of a Workshop for the
Intelligence Community
|
Externas |
Passa sumo |
|
CCC
Privacy by Design Workshops
|
Externas |
Passa sumo |
|
International
Workshop on Privacy Engineering
|
Externas |
Passa sumo |
|
Responding
to Section 5(d) of Presidential Policy Directive 28: The Feasability
of Software to Provide Alternatives to Bulk Signals Intelligence
Collection
|
Externas |
Passa sumo |
|
Sackler
Forum on Cybersecurity
|
Externas |
Passa sumo |
|
American Association for
the Advancement of Science
|
Externas |
Passa sumo |
|
Cybersecurity
Ideas Lab
|
Externas |
Passa sumo |
|
NSF Secure and
Trustworthy Cyberspace PI Meeting
|
Externas |
Passa sumo |
|
New Security Paradigms
Workshop
|
Externas |
Passa sumo |
|
Usability, Security, and Privacy of Computer Systems: a Workshop,
|
Externas |
Passa sumo |
|
National Academies of Science, Engineering, and Medicine,
|
Externas |
Passa sumo |
|
ACM Cloud
Computing Security Workshop,
|
Externas |
Passa sumo |
|
FIND Observer Panel Report
|
Internas |
Passa sumo |
|
Computers, Freedom, and
Privacy
|
Externas |
Passa sumo |
|
IEEE
Symposium on Security and Privacy
|
Externas |
Passa sumo |
|
12th ACM
Conference on Computer and Communications Privacy
|
Externas |
Passa sumo |
|
Workshop on Privacy in the
Electronic Society
|
Externas |
Passa sumo |
|
CRA Grand Challenges in Information Security
and Assurance
|
Externas |
Passa sumo |
|
Computers,
Freedom, and Privacy
|
Externas |
Passa sumo |
|
Computers,
Freedom, and Privacy
|
Externas |
Passa sumo |
|
Sigma Xi
|
Externas |
Passa sumo |
|
GREPSEC Workshops
|
Externas |
Passa sumo |
|
GREPSEC IV
|
Externas |
Passa sumo |
|
GREPSEC III
|
Externas |
Passa sumo |
|
GREPSEC II
|
Externas |
Passa sumo |
|
GREPSEC
|
Externas |
Passa sumo |
|
Grace Hopper Celebration of Women
in Computer Science
|
Externas |
Passa sumo |
|
MIT Women in
Math: A Celebration
|
Externas |
Passa sumo |
|
Grace Hopper Celebration of Women in
Computer Science
|
Externas |
Passa sumo |
|
researcHers
|
Externas |
Passa sumo |
|
The
Booklist
|
Externas |
Passa sumo |
|
CRA
Committee on the Status of Women in Computing Research
|
Externas |
Passa sumo |
|
Association
for Women in Mathematics
|
Externas |
Passa sumo |
|
John
S. Guggenheim Memorial Foundation
|
Externas |
Passa sumo |
|
Association
for Computing Machinery
|
Externas |
Passa sumo |
|
Anita Borg Institute for Women
and Technology
|
Externas |
Passa sumo |
|
Site
Design by Silvana.Net
|
Externas |
Passa sumo |