BibTeX records: Aaron D. Jaggard

download as .bib file

@article{DBLP:journals/popets/JohnsonJS23,
  author       = {Aaron Johnson and
                  Aaron D. Jaggard and
                  Paul Syverson},
  title        = {Throwing Your Weight Around: Fixing Tor's Positional Weighting},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {593--612},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0127},
  doi          = {10.56553/POPETS-2023-0127},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JohnsonJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/FeigenbaumJW20,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  title        = {Accountability in Computing: Concepts and Mechanisms},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {247--399},
  year         = {2020},
  url          = {https://doi.org/10.1561/3300000002},
  doi          = {10.1561/3300000002},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenJMS20,
  author       = {Olga Chen and
                  Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael C. Shlanta},
  title        = {NExtSteP: An Extensible Testbed for Network Covert Channels},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162247},
  doi          = {10.1109/CNS48642.2020.9162247},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/teco/JaggardLSW17,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Dynamics at the Boundary of Game Theory and Distributed Computing},
  journal      = {{ACM} Trans. Economics and Comput.},
  volume       = {5},
  number       = {3},
  pages        = {15:1--15:20},
  year         = {2017},
  url          = {https://doi.org/10.1145/3107182},
  doi          = {10.1145/3107182},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/teco/JaggardLSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JohnsonJJFS17,
  author       = {Aaron Johnson and
                  Rob Jansen and
                  Aaron D. Jaggard and
                  Joan Feigenbaum and
                  Paul Syverson},
  title        = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
                  Path Selection},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/avoding-man-wire-improving-tors-security-trust-aware-path-selection/},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JohnsonJJFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JaggardS17,
  author       = {Aaron D. Jaggard and
                  Paul Syverson},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Onions in the Crosshairs: When The Man really \emph{is} out to get
                  you},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {141--151},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139553},
  doi          = {10.1145/3139550.3139553},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/JaggardS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardS17,
  author       = {Aaron D. Jaggard and
                  Paul Syverson},
  title        = {Onions in the Crosshairs: When The Man really is out to get you},
  journal      = {CoRR},
  volume       = {abs/1706.10292},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.10292},
  eprinttype    = {arXiv},
  eprint       = {1706.10292},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JaggardJCSF15,
  author       = {Aaron D. Jaggard and
                  Aaron Johnson and
                  Sarah Cortes and
                  Paul Syverson and
                  Joan Feigenbaum},
  title        = {20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs,
                  and Undersea Cables},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {1},
  pages        = {4--24},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0002},
  doi          = {10.1515/POPETS-2015-0002},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JaggardJCSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardLSW15,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Dynamics at the Boundary of Game Theory and Distributed Computing},
  journal      = {CoRR},
  volume       = {abs/1509.02955},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.02955},
  eprinttype    = {arXiv},
  eprint       = {1509.02955},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JohnsonJJFS15,
  author       = {Aaron Johnson and
                  Rob Jansen and
                  Aaron D. Jaggard and
                  Joan Feigenbaum and
                  Paul F. Syverson},
  title        = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
                  Path Selection},
  journal      = {CoRR},
  volume       = {abs/1511.05453},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.05453},
  eprinttype    = {arXiv},
  eprint       = {1511.05453},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JohnsonJJFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumJS14,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Michael Schapira},
  title        = {Approximate Privacy: Foundations and Quantification},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {10},
  number       = {3},
  pages        = {11:1--11:38},
  year         = {2014},
  url          = {https://doi.org/10.1145/2601067},
  doi          = {10.1145/2601067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/FeigenbaumJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Open vs. closed systems for accountability},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600179},
  doi          = {10.1145/2600176.2600179},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/FeigenbaumJW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sagt/JaggardLSW14,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Ron Lavi},
  title        = {Self-stabilizing Uncoupled Dynamics},
  booktitle    = {Algorithmic Game Theory - 7th International Symposium, {SAGT} 2014,
                  Haifa, Israel, September 30 - October 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8768},
  pages        = {74--85},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44803-8\_7},
  doi          = {10.1007/978-3-662-44803-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sagt/JaggardLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JaggardW14,
  author       = {Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Strange Bedfellows: How and When to Work with Your Enemy},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {263--267},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_25},
  doi          = {10.1007/978-3-319-12400-1\_25},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JaggardW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardLSW14,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Self-stabilizing uncoupled dynamics},
  journal      = {CoRR},
  volume       = {abs/1403.5791},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.5791},
  eprinttype    = {arXiv},
  eprint       = {1403.5791},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardJSF14,
  author       = {Aaron D. Jaggard and
                  Aaron Johnson and
                  Paul F. Syverson and
                  Joan Feigenbaum},
  title        = {Representing Network Trust and Using It to Improve Anonymous Communication},
  journal      = {CoRR},
  volume       = {abs/1406.3583},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.3583},
  eprinttype    = {arXiv},
  eprint       = {1406.3583},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardJSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/FabrikantJS13,
  author       = {Alex Fabrikant and
                  Aaron D. Jaggard and
                  Michael Schapira},
  title        = {On the Structure of Weakly Acyclic Games},
  journal      = {Theory Comput. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {107--122},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00224-013-9457-0},
  doi          = {10.1007/S00224-013-9457-0},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/FabrikantJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/JaggardKRW13,
  author       = {Aaron D. Jaggard and
                  Swara Kopparty and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  editor       = {Mor Harchol{-}Balter and
                  John R. Douceur and
                  Jun Xu},
  title        = {The design space of probing algorithms for network-performance measurement},
  booktitle    = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
                  of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
                  2013},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2465529.2465765},
  doi          = {10.1145/2465529.2465765},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/JaggardKRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorics/BaxterJ11,
  author       = {Andrew Baxter and
                  Aaron D. Jaggard},
  title        = {Pattern Avoidance by Even Permutations},
  journal      = {Electron. J. Comb.},
  volume       = {18},
  number       = {2},
  year         = {2011},
  url          = {https://doi.org/10.37236/2024},
  doi          = {10.37236/2024},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorics/BaxterJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesCJST11,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  title        = {Cryptographically sound security proofs for basic and public-key Kerberos},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {2},
  pages        = {107--134},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0125-6},
  doi          = {10.1007/S10207-011-0125-6},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesCJST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/JaggardSW11,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Bernard Chazelle},
  title        = {Distributed Computing with Adaptive Heuristics},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {417--443},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/25.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/JaggardSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Towards a formal model of accountability},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073282},
  doi          = {10.1145/2073276.2073282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JaggardSW11,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Cyril Gavoille and
                  Pierre Fraigniaud},
  title        = {Distributed computing with rules of thumb},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011},
  pages        = {333--334},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993806.1993870},
  doi          = {10.1145/1993806.1993870},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/JaggardSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11,
  author       = {Joan Feigenbaum and
                  James A. Hendler and
                  Aaron D. Jaggard and
                  Daniel J. Weitzner and
                  Rebecca N. Wright},
  editor       = {David De Roure and
                  Marshall Scott Poole},
  title        = {Accountability and deterrence in online life},
  booktitle    = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011},
  pages        = {7:1--7:7},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2527031.2527043},
  doi          = {10.1145/2527031.2527043},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2092,
  author       = {Alex Fabrikant and
                  Aaron D. Jaggard and
                  Michael Schapira},
  title        = {On the Structure of Weakly Acyclic Games},
  journal      = {CoRR},
  volume       = {abs/1108.2092},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.2092},
  eprinttype    = {arXiv},
  eprint       = {1108.2092},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-2092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10,
  author       = {Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael W. Mislove and
                  Roberto Segala},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Reasoning about Probabilistic Security Using Task-PIOAs},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {2--22},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_2},
  doi          = {10.1007/978-3-642-16074-5\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sagt/FabrikantJS10,
  author       = {Alex Fabrikant and
                  Aaron D. Jaggard and
                  Michael Schapira},
  editor       = {Spyros C. Kontogiannis and
                  Elias Koutsoupias and
                  Paul G. Spirakis},
  title        = {On the Structure of Weakly Acyclic Games},
  booktitle    = {Algorithmic Game Theory - Third International Symposium, {SAGT} 2010,
                  Athens, Greece, October 18-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6386},
  pages        = {126--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16170-4\_12},
  doi          = {10.1007/978-3-642-16170-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sagt/FabrikantJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumJS10,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Michael Schapira},
  editor       = {David C. Parkes and
                  Chrysanthos Dellarocas and
                  Moshe Tennenholtz},
  title        = {Approximate privacy: foundations and quantification (extended abstract)},
  booktitle    = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010),
                  Cambridge, Massachusetts, USA, June 7-11, 2010},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1807342.1807369},
  doi          = {10.1145/1807342.1807369},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/FeigenbaumJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-3388,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Michael Schapira},
  title        = {Approximate Privacy: PARs for Set Problems},
  journal      = {CoRR},
  volume       = {abs/1001.3388},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.3388},
  eprinttype    = {arXiv},
  eprint       = {1001.3388},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-3388.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JaggardRW09,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  title        = {The Impact of Communication Models on Routing-Algorithm Convergence},
  booktitle    = {29th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDCS.2009.61},
  doi          = {10.1109/ICDCS.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JaggardRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-1585,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Towards a Unified Approach to (In)Decision: Routing, Games, Circuits,
                  Consensus, and Beyond},
  journal      = {CoRR},
  volume       = {abs/0910.1585},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.1585},
  eprinttype    = {arXiv},
  eprint       = {0910.1585},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-1585.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-5714,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Michael Schapira},
  title        = {Approximate Privacy: Foundations and Quantification},
  journal      = {CoRR},
  volume       = {abs/0910.5714},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.5714},
  eprinttype    = {arXiv},
  eprint       = {0910.5714},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-5714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CervesatoJSTW08,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay and
                  Christopher Walstad},
  title        = {Breaking and fixing public-key Kerberos},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {402--424},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.05.005},
  doi          = {10.1016/J.IC.2007.05.005},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/CervesatoJSTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlanchetJST08,
  author       = {Bruno Blanchet and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Computationally sound mechanized proofs for basic and public-key Kerberos},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {87--99},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368326},
  doi          = {10.1145/1368310.1368326},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlanchetJST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GoldbergHJRW08,
  author       = {Sharon Goldberg and
                  Shai Halevi and
                  Aaron D. Jaggard and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  editor       = {Victor Bahl and
                  David Wetherall and
                  Stefan Savage and
                  Ion Stoica},
  title        = {Rationality and traffic attraction: incentives for honest path announcements
                  in bgp},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Seattle, WA, USA, August 17-22, 2008},
  pages        = {267--278},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1402958.1402989},
  doi          = {10.1145/1402958.1402989},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/GoldbergHJRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rsa/Jaggard07,
  author       = {Aaron D. Jaggard},
  title        = {An almost-bijective proof of an asymptotic property of partitions},
  journal      = {Random Struct. Algorithms},
  volume       = {31},
  number       = {2},
  pages        = {247--250},
  year         = {2007},
  url          = {https://doi.org/10.1002/rsa.20180},
  doi          = {10.1002/RSA.20180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rsa/Jaggard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ButlerCJSW06,
  author       = {Frederick Butler and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Christopher Walstad},
  title        = {Formal analysis of Kerberos 5},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {57--87},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.040},
  doi          = {10.1016/J.TCS.2006.08.040},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ButlerCJSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/CervesatoJSTW06,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay and
                  Christopher Walstad},
  editor       = {Mitsu Okada and
                  Ichiro Satoh},
  title        = {Breaking and Fixing Public-Key Kerberos},
  booktitle    = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related
                  Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December
                  6-8, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4435},
  pages        = {167--181},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77505-8\_13},
  doi          = {10.1007/978-3-540-77505-8\_13},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asian/CervesatoJSTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesCJST06,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {362--383},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_23},
  doi          = {10.1007/11863908\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesCJST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/JaggardR06,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran},
  title        = {Robust Path-Vector Routing Despite Inconsistent Route Preferences},
  booktitle    = {Proceedings of the 14th {IEEE} International Conference on Network
                  Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California,
                  {USA}},
  pages        = {270--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICNP.2006.320220},
  doi          = {10.1109/ICNP.2006.320220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/JaggardR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CervesatoJSTW06,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay and
                  Christopher Walstad},
  title        = {Breaking and Fixing Public-Key Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CervesatoJSTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesCJST06,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  title        = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesCJST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorics/Jaggard05,
  author       = {Aaron D. Jaggard},
  title        = {Subsequence Containment by Involutions},
  journal      = {Electron. J. Comb.},
  volume       = {12},
  year         = {2005},
  url          = {https://doi.org/10.37236/1911},
  doi          = {10.37236/1911},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorics/Jaggard05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/JaggardR05,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran},
  title        = {Toward the design of robust interdomain routing protocols},
  journal      = {{IEEE} Netw.},
  volume       = {19},
  number       = {6},
  pages        = {35--41},
  year         = {2005},
  url          = {https://doi.org/10.1109/MNET.2005.1541719},
  doi          = {10.1109/MNET.2005.1541719},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/JaggardR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JaggardR05,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran},
  title        = {Relating two formal models of path-vector routing},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {619--630},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1497928},
  doi          = {10.1109/INFCOM.2005.1497928},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JaggardR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CervesatoJSW05,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Christopher Walstad},
  editor       = {Catherine Meadows},
  title        = {Specifying Kerberos 5 cross-realm authentication},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {12--26},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045408},
  doi          = {10.1145/1045405.1045408},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/CervesatoJSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/JaggardR04,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran},
  title        = {Robustness of Class-Based Path-Vector Systems},
  booktitle    = {12th {IEEE} International Conference on Network Protocols {(ICNP}
                  2004), 5-8 October 2004, Berlin, Germany},
  pages        = {84--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICNP.2004.1348088},
  doi          = {10.1109/ICNP.2004.1348088},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/JaggardR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/ButlerCJS03,
  author       = {Frederick Butler and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov},
  editor       = {Kokichi Futatsugi and
                  Fumio Mizoguchi and
                  Naoki Yonezaki},
  title        = {Verifying Confidentiality and Authentication in Kerberos 5},
  booktitle    = {Software Security - Theories and Systems, Second Mext-NSF-JSPS International
                  Symposium, {ISSS} 2003, Tokyo, Japan, November 4-6, 2003, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3233},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-37621-7\_1},
  doi          = {10.1007/978-3-540-37621-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/ButlerCJS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GriffinJR03,
  author       = {Timothy Griffin and
                  Aaron D. Jaggard and
                  Vijay Ramachandran},
  editor       = {Anja Feldmann and
                  Martina Zitterbart and
                  Jon Crowcroft and
                  David Wetherall},
  title        = {Design principles of policy languages for path vector protocols},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 25-29, 2003, Karlsruhe, Germany},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/863955.863964},
  doi          = {10.1145/863955.863964},
  timestamp    = {Sat, 30 Sep 2023 09:56:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/GriffinJR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorics/Jaggard02,
  author       = {Aaron D. Jaggard},
  title        = {Prefix Exchanging and Pattern Avoidance by Involutions},
  journal      = {Electron. J. Comb.},
  volume       = {9},
  number       = {2},
  year         = {2002},
  url          = {https://doi.org/10.37236/1688},
  doi          = {10.37236/1688},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorics/Jaggard02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ButlerCJS02,
  author       = {Frederick Butler and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov},
  title        = {A Formal Analysis of Some Properties of Kerberos 5 Using {MSR}},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {175},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021815},
  doi          = {10.1109/CSFW.2002.1021815},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ButlerCJS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics