Skip to search formSkip to main contentSkip to account menu

DROWN attack

Known as: DROWN 
The DROWN attack is a cross-protocol security bug that attacks servers supporting modern TLS protocol suites by using their support for the obsolete… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Today's software is developed by collaborating with various levels of people rather than being developed by superior individuals… 
2015
2015
One of the greatest opportunities and challenges of the 21st century is the ever increasing significance of data. Data underpins… 
2013
2013
Natural desires are among the most fundamental features of mankind. In this article six natural and fundamental desires will be… 
2011
2011
INTRODUCTION The most controversial Supreme Court decision of the 20092010 Supreme Court Term was, without question, Citizens… 
2002
2002
MicroWorlds is a derivative of Logo, and also belongs to a family of computer tools known as multi-media applications. Such… 
2001
2001
SUBTITLE: THE SEPTEMBER AVIATION ECONOMIST EXAMINED THE AIR TRANSPORT INDUSTRY'S LONG RECORD OF SUICIDALLY BAD LABOUR RELATIONS… 
1996
1996
Yorkville Dam is located on the Fox River in Yorkville, Illinois. It is a low overflow smcture (approximately 6 feet hgh) with a…