Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11565))

  • 382 Accesses

Abstract

Cathy has always been an inspiration for me, because of the example she has set for quality in her research work, and more personally for her interest in my own attempts in the same area. In all her professional activities, I admire her humility, energy, constructive ideas, and commitment to serving the research community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptol. 7(2), 79–130 (1994)

    Article  Google Scholar 

  2. Meadows, C.: Using narrowing in the analysis of key management protocols. In: IEEE Symposium on Security and Privacy, pp. 138–147. IEEE Computer Society (1989)

    Google Scholar 

  3. Millen, J., Ko, H.-P.: Narrowing terminates for encryption. In: IEEE Computer Security Foundations, pp. 39–49. IEEE Computer Society (1996)

    Google Scholar 

  4. Meadows, C.: Extending the Brewer-Nash model to a multilevel context. In: IEEE Symposium on Security and Privacy, pp. 95–102. IEEE Computer Society (1990)

    Google Scholar 

  5. Millen, J.: Local reconfiguration policies. In: IEEE Symposium on Security and Privacy, pp. 48–56. IEEE Computer Society (1999)

    Google Scholar 

  6. Millen, J.: On the freedom of decryption. Inf. Process. Lett. 86(6), 329–333 (2003)

    Article  MathSciNet  Google Scholar 

  7. Lynch, C., Meadows, C.: On the relative soundness of the free agebra model for public key encryption. Electron. Notes Theor. Comput. Sci. 125(1), 43–54 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jon Millen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Millen, J. (2019). A Long, Slow Conversation. In: Guttman, J., Landwehr, C., Meseguer, J., Pavlovic, D. (eds) Foundations of Security, Protocols, and Equational Reasoning. Lecture Notes in Computer Science(), vol 11565. Springer, Cham. https://doi.org/10.1007/978-3-030-19052-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19052-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19051-4

  • Online ISBN: 978-3-030-19052-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics