Jonathan K. Millen
Orcid: 0000-0003-1896-5225Affiliations:
- MITRE Corporation, Bedford, MA, USA
According to our database1,
Jonathan K. Millen
authored at least 52 papers
between 1967 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Proceedings of the Protocols, Strands, and Logic, 2021
2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
2008
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008
2005
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
J. Comput. Secur., 2005
2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
2002
Proceedings of the Fourth International Workshop on Rewriting logic and Its Applications, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
2001
J. Comput. Secur., 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the CCS 2001, 2001
2000
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk.
Proceedings of the 3rd International Workshop on Rewriting Logic and its Applications, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
1996
Proceedings of the 1996 Workshop on New Security Paradigms, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
1994
1993
J. Comput. Secur., 1993
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1989
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989
1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
1984
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984
1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
1981
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
1980
1978
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978
1976
1974
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974
1972
Microtext: the design of a microprogrammed finite state search machine for full-text retrieval.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972
1967
CHARYBDIS: a LISP program to display mathematical expressions on typewriter-like devices.
Proceedings of the ACM Symposium on Interactive Systems for Experimental Applied Mathematics, 1967