Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,686,816 papers from all fields of science
Search
Sign In
Create Free Account
LibreSSL
LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It was forked from the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
"Classic" Mac OS
Address space layout randomization
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement
Jinhyung Jung
,
육군 지상작전사령부 연합사단협조단
,
Soo Jin Lee
Jouranl of Information and Security
2019
Corpus ID: 201129162
2017
2017
Finding Security Vulnerabilities in Network Protocols Using Methods of Formal Verification
Adi Sosnovich
2017
Corpus ID: 254410491
1 Abbreviations and Notations 3
2014
2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities
S. Anand
,
S. Sengupta
,
Kai Hong
,
K.P. Subbalakshmi
,
R. Chandramouli
,
H. Çam
IEEE Transactions on Vehicular Technology
2014
Corpus ID: 3655765
We address a unique security vulnerability due to spectrum fragmentation, aggregation, and bonding in IEEE 802.22-based dynamic…
Expand
2013
2013
ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study
Dawei Li
,
X. Hong
,
Darwin Witt
IEEE Systems Journal
2013
Corpus ID: 17603805
ProtoGENI is one of the prototype implementations of global environment for network innovations (GENI). ProtoGENI proposes and…
Expand
2011
2011
Vetting Browser Extensions for Security Vulnerabilities
R. Sandvik
2011
Corpus ID: 14390261
2009
2009
Why Developers Insert Security Vulnerabilities into Their Code
Kaarina Karppinen
,
Lyly Yonkwa
,
M. Lindvall
Second International Conferences on Advances in…
2009
Corpus ID: 22960568
Modern software systems are difficult to test due to their distributed nature, and increased security complicates testing even…
Expand
2006
2006
OSPF Security Vulnerabilities Analysis
Emanuele Jones
,
O. L. Moigne
2006
Corpus ID: 114068711
Internet infrastructure protocols were designed at the very early stages of computer networks when "cyberspace" was still…
Expand
2006
2006
Functionality Meets Terminology to Address Network Security Vulnerabilities
G. Goth
IEEE Distributed Syst. Online
2006
Corpus ID: 27063442
Security vendors and administrators welcomed the CVE effort almost from the start, but the supporting infrastructure around it…
Expand
2005
2005
National Vulnerability Database: Helping Information Technology System Users and Developers Find Current Information about Cyber Security Vulnerabilities | NIST
S. Radack
2005
Corpus ID: 134039869
2000
2000
Remediation of Application-Specific Security Vulnerabilities at Runtime
T. Bowen
,
M. Segal
IEEE Software
2000
Corpus ID: 28588618
Researchers at Telcordia Technologies and the State University of New York, Stony Brook, are working on an approach that gives…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE