Aaron D. Jaggard

Orcid: 0000-0003-0628-4553

According to our database1, Aaron D. Jaggard authored at least 42 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Logic of Sattestation.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Throwing Your Weight Around: Fixing Tor's Positional Weighting.
Proc. Priv. Enhancing Technol., October, 2023

2020
Accountability in Computing: Concepts and Mechanisms.
Found. Trends Priv. Secur., 2020

NExtSteP: An Extensible Testbed for Network Covert Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2017
Dynamics at the Boundary of Game Theory and Distributed Computing.
ACM Trans. Economics and Comput., 2017

Onions in the Crosshairs: When The Man really is out to get you.
CoRR, 2017

Onions in the Crosshairs: When The Man really <i>is</i> out to get you.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2015
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables.
Proc. Priv. Enhancing Technol., 2015

2014
Approximate Privacy: Foundations and Quantification.
ACM Trans. Algorithms, 2014

Representing Network Trust and Using It to Improve Anonymous Communication.
CoRR, 2014

Strange Bedfellows: How and When to Work with Your Enemy.
Proceedings of the Security Protocols XXII, 2014

Self-stabilizing Uncoupled Dynamics.
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014

Open vs. closed systems for accountability.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
On the Structure of Weakly Acyclic Games.
Theory Comput. Syst., 2013

The design space of probing algorithms for network-performance measurement.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

2011
Pattern Avoidance by Even Permutations.
Electron. J. Comb., 2011

Accountability and deterrence in online life.
Proceedings of the Web Science 2011, 2011

Distributed computing with rules of thumb.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Towards a formal model of accountability.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Distributed Computing with Adaptive Heuristics.
Proceedings of the Innovations in Computer Science, 2011

2010
Approximate Privacy: PARs for Set Problems
CoRR, 2010

Approximate privacy: foundations and quantification (extended abstract).
Proceedings of the Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), 2010

Reasoning about Probabilistic Security Using Task-PIOAs.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

2009
Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
CoRR, 2009

The Impact of Communication Models on Routing-Algorithm Convergence.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Rationality and traffic attraction: incentives for honest path announcements in bgp.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Computationally sound mechanized proofs for basic and public-key Kerberos.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
An almost-bijective proof of an asymptotic property of partitions.
Random Struct. Algorithms, 2007

2006
Formal analysis of Kerberos 5.
Theor. Comput. Sci., 2006

Breaking and Fixing Public-Key Kerberos.
IACR Cryptol. ePrint Arch., 2006

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
IACR Cryptol. ePrint Arch., 2006

Robust Path-Vector Routing Despite Inconsistent Route Preferences.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

2005
Toward the design of robust interdomain routing protocols.
IEEE Netw., 2005

Subsequence Containment by Involutions.
Electron. J. Comb., 2005

Specifying Kerberos 5 cross-realm authentication.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

Relating two formal models of path-vector routing.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Robustness of Class-Based Path-Vector Systems.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

2003
Design principles of policy languages for path vector protocols.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

Verifying Confidentiality and Authentication in Kerberos 5.
Proceedings of the Software Security, 2003

2002
Prefix Exchanging and Pattern Avoidance by Involutions.
Electron. J. Comb., 2002

A Formal Analysis of Some Properties of Kerberos 5 Using MSR.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002


  Loading...