Abstract
Cathy has always been an inspiration for me, because of the example she has set for quality in her research work, and more personally for her interest in my own attempts in the same area. In all her professional activities, I admire her humility, energy, constructive ideas, and commitment to serving the research community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptol. 7(2), 79–130 (1994)
Meadows, C.: Using narrowing in the analysis of key management protocols. In: IEEE Symposium on Security and Privacy, pp. 138–147. IEEE Computer Society (1989)
Millen, J., Ko, H.-P.: Narrowing terminates for encryption. In: IEEE Computer Security Foundations, pp. 39–49. IEEE Computer Society (1996)
Meadows, C.: Extending the Brewer-Nash model to a multilevel context. In: IEEE Symposium on Security and Privacy, pp. 95–102. IEEE Computer Society (1990)
Millen, J.: Local reconfiguration policies. In: IEEE Symposium on Security and Privacy, pp. 48–56. IEEE Computer Society (1999)
Millen, J.: On the freedom of decryption. Inf. Process. Lett. 86(6), 329–333 (2003)
Lynch, C., Meadows, C.: On the relative soundness of the free agebra model for public key encryption. Electron. Notes Theor. Comput. Sci. 125(1), 43–54 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Millen, J. (2019). A Long, Slow Conversation. In: Guttman, J., Landwehr, C., Meseguer, J., Pavlovic, D. (eds) Foundations of Security, Protocols, and Equational Reasoning. Lecture Notes in Computer Science(), vol 11565. Springer, Cham. https://doi.org/10.1007/978-3-030-19052-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-19052-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19051-4
Online ISBN: 978-3-030-19052-1
eBook Packages: Computer ScienceComputer Science (R0)