Advertisement

A Long, Slow Conversation

  • Jon MillenEmail author
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11565)

Abstract

Cathy has always been an inspiration for me, because of the example she has set for quality in her research work, and more personally for her interest in my own attempts in the same area. In all her professional activities, I admire her humility, energy, constructive ideas, and commitment to serving the research community.

References

  1. 1.
    Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptol. 7(2), 79–130 (1994)CrossRefGoogle Scholar
  2. 2.
    Meadows, C.: Using narrowing in the analysis of key management protocols. In: IEEE Symposium on Security and Privacy, pp. 138–147. IEEE Computer Society (1989)Google Scholar
  3. 3.
    Millen, J., Ko, H.-P.: Narrowing terminates for encryption. In: IEEE Computer Security Foundations, pp. 39–49. IEEE Computer Society (1996)Google Scholar
  4. 4.
    Meadows, C.: Extending the Brewer-Nash model to a multilevel context. In: IEEE Symposium on Security and Privacy, pp. 95–102. IEEE Computer Society (1990)Google Scholar
  5. 5.
    Millen, J.: Local reconfiguration policies. In: IEEE Symposium on Security and Privacy, pp. 48–56. IEEE Computer Society (1999)Google Scholar
  6. 6.
    Millen, J.: On the freedom of decryption. Inf. Process. Lett. 86(6), 329–333 (2003)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Lynch, C., Meadows, C.: On the relative soundness of the free agebra model for public key encryption. Electron. Notes Theor. Comput. Sci. 125(1), 43–54 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

Personalised recommendations