The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Aaron D. Jaggard: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov
    A Formal Analysis of Some Properties of Kerberos 5 Using MSR. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:175-0 [Conf]
  2. Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
    Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:362-383 [Conf]
  3. Aaron D. Jaggard, Vijay Ramachandran
    Robustness of Class-Based Path-Vector Systems. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:84-93 [Conf]
  4. Aaron D. Jaggard, Vijay Ramachandran
    Relating two formal models of path-vector routing. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:619-630 [Conf]
  5. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov
    Verifying Confidentiality and Authentication in Kerberos 5. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:1-24 [Conf]
  6. Timothy Griffin, Aaron D. Jaggard, Vijay Ramachandran
    Design principles of policy languages for path vector protocols. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:61-72 [Conf]
  7. Aaron D. Jaggard
    Prefix Exchanging and Pattern Avoidance by Involutions. [Citation Graph (0, 0)][DBLP]
    Electr. J. Comb., 2002, v:0, n:2, pp:- [Journal]
  8. Aaron D. Jaggard, Vijay Ramachandran
    Toward the design of robust interdomain routing protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2005, v:19, n:6, pp:35-41 [Journal]
  9. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad
    Formal analysis of Kerberos 5. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:57-87 [Journal]

  10. Breaking and Fixing Public-Key Kerberos. [Citation Graph (, )][DBLP]


  11. Computationally sound mechanized proofs for basic and public-key Kerberos. [Citation Graph (, )][DBLP]


  12. The Impact of Communication Models on Routing-Algorithm Convergence. [Citation Graph (, )][DBLP]


  13. Robust Path-Vector Routing Despite Inconsistent Route Preferences. [Citation Graph (, )][DBLP]


  14. Specifying Kerberos 5 cross-realm authentication. [Citation Graph (, )][DBLP]


  15. Rationality and traffic attraction: incentives for honest path announcements in bgp. [Citation Graph (, )][DBLP]


  16. Approximate privacy: foundations and quantification (extended abstract). [Citation Graph (, )][DBLP]


  17. Subsequence Containment by Involutions. [Citation Graph (, )][DBLP]


  18. Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond [Citation Graph (, )][DBLP]


  19. Approximate Privacy: Foundations and Quantification [Citation Graph (, )][DBLP]


  20. Approximate Privacy: PARs for Set Problems [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002