default search action
BibTeX records: Aaron D. Jaggard
@article{DBLP:journals/corr/abs-2405-01809, author = {Aaron D. Jaggard and Paul Syverson and Catherine Meadows}, title = {A Logic of Sattestation}, journal = {CoRR}, volume = {abs/2405.01809}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.01809}, doi = {10.48550/ARXIV.2405.01809}, eprinttype = {arXiv}, eprint = {2405.01809}, timestamp = {Sun, 09 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-01809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JohnsonJS23, author = {Aaron Johnson and Aaron D. Jaggard and Paul Syverson}, title = {Throwing Your Weight Around: Fixing Tor's Positional Weighting}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {593--612}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0127}, doi = {10.56553/POPETS-2023-0127}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JohnsonJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/FeigenbaumJW20, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, title = {Accountability in Computing: Concepts and Mechanisms}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {4}, pages = {247--399}, year = {2020}, url = {https://doi.org/10.1561/3300000002}, doi = {10.1561/3300000002}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenJMS20, author = {Olga Chen and Aaron D. Jaggard and Catherine Meadows and Michael C. Shlanta}, title = {NExtSteP: An Extensible Testbed for Network Covert Channels}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162247}, doi = {10.1109/CNS48642.2020.9162247}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/teco/JaggardLSW17, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Dynamics at the Boundary of Game Theory and Distributed Computing}, journal = {{ACM} Trans. Economics and Comput.}, volume = {5}, number = {3}, pages = {15:1--15:20}, year = {2017}, url = {https://doi.org/10.1145/3107182}, doi = {10.1145/3107182}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/teco/JaggardLSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JohnsonJJFS17, author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson}, title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/avoding-man-wire-improving-tors-security-trust-aware-path-selection/}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JohnsonJJFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JaggardS17, author = {Aaron D. Jaggard and Paul Syverson}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Onions in the Crosshairs: When The Man really \emph{is} out to get you}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {141--151}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139553}, doi = {10.1145/3139550.3139553}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/JaggardS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardS17, author = {Aaron D. Jaggard and Paul Syverson}, title = {Onions in the Crosshairs: When The Man really is out to get you}, journal = {CoRR}, volume = {abs/1706.10292}, year = {2017}, url = {http://arxiv.org/abs/1706.10292}, eprinttype = {arXiv}, eprint = {1706.10292}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JaggardJCSF15, author = {Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan Feigenbaum}, title = {20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {1}, pages = {4--24}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0002}, doi = {10.1515/POPETS-2015-0002}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JaggardJCSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardLSW15, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Dynamics at the Boundary of Game Theory and Distributed Computing}, journal = {CoRR}, volume = {abs/1509.02955}, year = {2015}, url = {http://arxiv.org/abs/1509.02955}, eprinttype = {arXiv}, eprint = {1509.02955}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JohnsonJJFS15, author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul F. Syverson}, title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection}, journal = {CoRR}, volume = {abs/1511.05453}, year = {2015}, url = {http://arxiv.org/abs/1511.05453}, eprinttype = {arXiv}, eprint = {1511.05453}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JohnsonJJFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/FeigenbaumJS14, author = {Joan Feigenbaum and Aaron D. Jaggard and Michael Schapira}, title = {Approximate Privacy: Foundations and Quantification}, journal = {{ACM} Trans. Algorithms}, volume = {10}, number = {3}, pages = {11:1--11:38}, year = {2014}, url = {https://doi.org/10.1145/2601067}, doi = {10.1145/2601067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/FeigenbaumJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Open vs. closed systems for accountability}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600179}, doi = {10.1145/2600176.2600179}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/FeigenbaumJW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sagt/JaggardLSW14, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, editor = {Ron Lavi}, title = {Self-stabilizing Uncoupled Dynamics}, booktitle = {Algorithmic Game Theory - 7th International Symposium, {SAGT} 2014, Haifa, Israel, September 30 - October 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8768}, pages = {74--85}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44803-8\_7}, doi = {10.1007/978-3-662-44803-8\_7}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/sagt/JaggardLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JaggardW14, author = {Aaron D. Jaggard and Rebecca N. Wright}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Strange Bedfellows: How and When to Work with Your Enemy}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {263--267}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_25}, doi = {10.1007/978-3-319-12400-1\_25}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/JaggardW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardLSW14, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Self-stabilizing uncoupled dynamics}, journal = {CoRR}, volume = {abs/1403.5791}, year = {2014}, url = {http://arxiv.org/abs/1403.5791}, eprinttype = {arXiv}, eprint = {1403.5791}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardJSF14, author = {Aaron D. Jaggard and Aaron Johnson and Paul F. Syverson and Joan Feigenbaum}, title = {Representing Network Trust and Using It to Improve Anonymous Communication}, journal = {CoRR}, volume = {abs/1406.3583}, year = {2014}, url = {http://arxiv.org/abs/1406.3583}, eprinttype = {arXiv}, eprint = {1406.3583}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardJSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/FabrikantJS13, author = {Alex Fabrikant and Aaron D. Jaggard and Michael Schapira}, title = {On the Structure of Weakly Acyclic Games}, journal = {Theory Comput. Syst.}, volume = {53}, number = {1}, pages = {107--122}, year = {2013}, url = {https://doi.org/10.1007/s00224-013-9457-0}, doi = {10.1007/S00224-013-9457-0}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/FabrikantJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/JaggardKRW13, author = {Aaron D. Jaggard and Swara Kopparty and Vijay Ramachandran and Rebecca N. Wright}, editor = {Mor Harchol{-}Balter and John R. Douceur and Jun Xu}, title = {The design space of probing algorithms for network-performance measurement}, booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21, 2013}, pages = {105--116}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465529.2465765}, doi = {10.1145/2465529.2465765}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/JaggardKRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorics/BaxterJ11, author = {Andrew Baxter and Aaron D. Jaggard}, title = {Pattern Avoidance by Even Permutations}, journal = {Electron. J. Comb.}, volume = {18}, number = {2}, year = {2011}, url = {https://doi.org/10.37236/2024}, doi = {10.37236/2024}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorics/BaxterJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesCJST11, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, title = {Cryptographically sound security proofs for basic and public-key Kerberos}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {2}, pages = {107--134}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0125-6}, doi = {10.1007/S10207-011-0125-6}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesCJST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/JaggardSW11, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, editor = {Bernard Chazelle}, title = {Distributed Computing with Adaptive Heuristics}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {417--443}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/25.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/JaggardSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Towards a formal model of accountability}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {45--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073282}, doi = {10.1145/2073276.2073282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/JaggardSW11, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, editor = {Cyril Gavoille and Pierre Fraigniaud}, title = {Distributed computing with rules of thumb}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011}, pages = {333--334}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993806.1993870}, doi = {10.1145/1993806.1993870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/JaggardSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11, author = {Joan Feigenbaum and James A. Hendler and Aaron D. Jaggard and Daniel J. Weitzner and Rebecca N. Wright}, editor = {David De Roure and Marshall Scott Poole}, title = {Accountability and deterrence in online life}, booktitle = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011}, pages = {7:1--7:7}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2527031.2527043}, doi = {10.1145/2527031.2527043}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-2092, author = {Alex Fabrikant and Aaron D. Jaggard and Michael Schapira}, title = {On the Structure of Weakly Acyclic Games}, journal = {CoRR}, volume = {abs/1108.2092}, year = {2011}, url = {http://arxiv.org/abs/1108.2092}, eprinttype = {arXiv}, eprint = {1108.2092}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-2092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10, author = {Aaron D. Jaggard and Catherine Meadows and Michael W. Mislove and Roberto Segala}, editor = {Alessandro Armando and Gavin Lowe}, title = {Reasoning about Probabilistic Security Using Task-PIOAs}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {2--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_2}, doi = {10.1007/978-3-642-16074-5\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sagt/FabrikantJS10, author = {Alex Fabrikant and Aaron D. Jaggard and Michael Schapira}, editor = {Spyros C. Kontogiannis and Elias Koutsoupias and Paul G. Spirakis}, title = {On the Structure of Weakly Acyclic Games}, booktitle = {Algorithmic Game Theory - Third International Symposium, {SAGT} 2010, Athens, Greece, October 18-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6386}, pages = {126--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16170-4\_12}, doi = {10.1007/978-3-642-16170-4\_12}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/sagt/FabrikantJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/FeigenbaumJS10, author = {Joan Feigenbaum and Aaron D. Jaggard and Michael Schapira}, editor = {David C. Parkes and Chrysanthos Dellarocas and Moshe Tennenholtz}, title = {Approximate privacy: foundations and quantification (extended abstract)}, booktitle = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010}, pages = {167--178}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1807342.1807369}, doi = {10.1145/1807342.1807369}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/FeigenbaumJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-3388, author = {Joan Feigenbaum and Aaron D. Jaggard and Michael Schapira}, title = {Approximate Privacy: PARs for Set Problems}, journal = {CoRR}, volume = {abs/1001.3388}, year = {2010}, url = {http://arxiv.org/abs/1001.3388}, eprinttype = {arXiv}, eprint = {1001.3388}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-3388.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JaggardRW09, author = {Aaron D. Jaggard and Vijay Ramachandran and Rebecca N. Wright}, title = {The Impact of Communication Models on Routing-Algorithm Convergence}, booktitle = {29th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDCS.2009.61}, doi = {10.1109/ICDCS.2009.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JaggardRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-1585, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, title = {Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond}, journal = {CoRR}, volume = {abs/0910.1585}, year = {2009}, url = {http://arxiv.org/abs/0910.1585}, eprinttype = {arXiv}, eprint = {0910.1585}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-1585.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-5714, author = {Joan Feigenbaum and Aaron D. Jaggard and Michael Schapira}, title = {Approximate Privacy: Foundations and Quantification}, journal = {CoRR}, volume = {abs/0910.5714}, year = {2009}, url = {http://arxiv.org/abs/0910.5714}, eprinttype = {arXiv}, eprint = {0910.5714}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-5714.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CervesatoJSTW08, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay and Christopher Walstad}, title = {Breaking and fixing public-key Kerberos}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {402--424}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.05.005}, doi = {10.1016/J.IC.2007.05.005}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/CervesatoJSTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlanchetJST08, author = {Bruno Blanchet and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Computationally sound mechanized proofs for basic and public-key Kerberos}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {87--99}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368326}, doi = {10.1145/1368310.1368326}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlanchetJST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/GoldbergHJRW08, author = {Sharon Goldberg and Shai Halevi and Aaron D. Jaggard and Vijay Ramachandran and Rebecca N. Wright}, editor = {Victor Bahl and David Wetherall and Stefan Savage and Ion Stoica}, title = {Rationality and traffic attraction: incentives for honest path announcements in bgp}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008}, pages = {267--278}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1402958.1402989}, doi = {10.1145/1402958.1402989}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/GoldbergHJRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rsa/Jaggard07, author = {Aaron D. Jaggard}, title = {An almost-bijective proof of an asymptotic property of partitions}, journal = {Random Struct. Algorithms}, volume = {31}, number = {2}, pages = {247--250}, year = {2007}, url = {https://doi.org/10.1002/rsa.20180}, doi = {10.1002/RSA.20180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rsa/Jaggard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ButlerCJSW06, author = {Frederick Butler and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Christopher Walstad}, title = {Formal analysis of Kerberos 5}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {57--87}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.040}, doi = {10.1016/J.TCS.2006.08.040}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ButlerCJSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/CervesatoJSTW06, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay and Christopher Walstad}, editor = {Mitsu Okada and Ichiro Satoh}, title = {Breaking and Fixing Public-Key Kerberos}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {167--181}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_13}, doi = {10.1007/978-3-540-77505-8\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asian/CervesatoJSTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesCJST06, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {362--383}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_23}, doi = {10.1007/11863908\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesCJST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JaggardR06, author = {Aaron D. Jaggard and Vijay Ramachandran}, title = {Robust Path-Vector Routing Despite Inconsistent Route Preferences}, booktitle = {Proceedings of the 14th {IEEE} International Conference on Network Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California, {USA}}, pages = {270--279}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICNP.2006.320220}, doi = {10.1109/ICNP.2006.320220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/JaggardR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CervesatoJSTW06, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay and Christopher Walstad}, title = {Breaking and Fixing Public-Key Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2006}, url = {http://eprint.iacr.org/2006/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CervesatoJSTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesCJST06, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, title = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2006}, url = {http://eprint.iacr.org/2006/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesCJST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorics/Jaggard05, author = {Aaron D. Jaggard}, title = {Subsequence Containment by Involutions}, journal = {Electron. J. Comb.}, volume = {12}, year = {2005}, url = {https://doi.org/10.37236/1911}, doi = {10.37236/1911}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorics/Jaggard05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/JaggardR05, author = {Aaron D. Jaggard and Vijay Ramachandran}, title = {Toward the design of robust interdomain routing protocols}, journal = {{IEEE} Netw.}, volume = {19}, number = {6}, pages = {35--41}, year = {2005}, url = {https://doi.org/10.1109/MNET.2005.1541719}, doi = {10.1109/MNET.2005.1541719}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/JaggardR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JaggardR05, author = {Aaron D. Jaggard and Vijay Ramachandran}, title = {Relating two formal models of path-vector routing}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {619--630}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1497928}, doi = {10.1109/INFCOM.2005.1497928}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JaggardR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CervesatoJSW05, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Christopher Walstad}, editor = {Catherine Meadows}, title = {Specifying Kerberos 5 cross-realm authentication}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {12--26}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045408}, doi = {10.1145/1045405.1045408}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/popl/CervesatoJSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JaggardR04, author = {Aaron D. Jaggard and Vijay Ramachandran}, title = {Robustness of Class-Based Path-Vector Systems}, booktitle = {12th {IEEE} International Conference on Network Protocols {(ICNP} 2004), 5-8 October 2004, Berlin, Germany}, pages = {84--93}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICNP.2004.1348088}, doi = {10.1109/ICNP.2004.1348088}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/JaggardR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/ButlerCJS03, author = {Frederick Butler and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov}, editor = {Kokichi Futatsugi and Fumio Mizoguchi and Naoki Yonezaki}, title = {Verifying Confidentiality and Authentication in Kerberos 5}, booktitle = {Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, {ISSS} 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3233}, pages = {1--24}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-37621-7\_1}, doi = {10.1007/978-3-540-37621-7\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/isss2/ButlerCJS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/GriffinJR03, author = {Timothy Griffin and Aaron D. Jaggard and Vijay Ramachandran}, editor = {Anja Feldmann and Martina Zitterbart and Jon Crowcroft and David Wetherall}, title = {Design principles of policy languages for path vector protocols}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany}, pages = {61--72}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/863955.863964}, doi = {10.1145/863955.863964}, timestamp = {Sat, 30 Sep 2023 09:56:14 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/GriffinJR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorics/Jaggard02, author = {Aaron D. Jaggard}, title = {Prefix Exchanging and Pattern Avoidance by Involutions}, journal = {Electron. J. Comb.}, volume = {9}, number = {2}, year = {2002}, url = {https://doi.org/10.37236/1688}, doi = {10.37236/1688}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorics/Jaggard02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ButlerCJS02, author = {Frederick Butler and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov}, title = {A Formal Analysis of Some Properties of Kerberos 5 Using {MSR}}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {175}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021815}, doi = {10.1109/CSFW.2002.1021815}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ButlerCJS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.