Skip to search formSkip to main contentSkip to account menu

OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Side channel attack is typically used to get private key of cryptography system. It is one type of great threats to the… 
2017
2017
The objective of control flow obfuscation is to protect the program control flow from analysis. A technique called control flow… 
2016
2016
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way… 
2015
2015
Protection of Internet communication is becoming more common in many products, as the demand for privacy in an age of state-level… 
2013
2013
UDP based Data Transfer (UDT) protocol has emerged as one of the next-generation high-speed network protocol for transferring… 
2010
2010
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to… 
2006
2006
Common occurrence of server overload and the threat of denial-of-service (DoS) attacks makes highly desirable to improve the… 
Review
2003
Review
2003
We review two surveys of large-scale system management, observing common problems across tools and over many years. We also note…