Jedidiah R. Crandall

Google Scholar ORCID: 0000-0001-7864-2992
22 publications in security and cryptology related venues
Year
Venue
Title
2022
conf/uss
OpenVPN is Open to VPN Fingerprinting.
2021
conf/uss
Blind In/On-Path Attacks and Applications to VPNs.
2017
conf/uss
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
2014
conf/uss
Counting Packets Sent Between Arbitrary Internet Hosts.
Jeffrey Knockel Jedidiah R. Crandall
2014
conf/uss
A Case Study in Helping Students to Covertly Eat Their Classmates.
Roya Ensafi Mike Jacobi Jedidiah R. Crandall
2013
conf/uss
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
2012
conf/uss
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Roya Ensafi Mike Jacobi Jedidiah R. Crandall
2012
conf/uss
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Jeffrey Knockel Jedidiah R. Crandall
2012
conf/uss
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
2011
conf/uss
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
Jeffrey Knockel Jedidiah R. Crandall Jared Saia
2010
conf/uss
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Roya Ensafi Jong Chun Park Deepak Kapur Jedidiah R. Crandall
Filters
Years:  to