Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,856 papers from all fields of science
Search
Sign In
Create Free Account
OpenSSL
Known as:
OpenSSL exception
, CVE-2014-0224
, BoringSSL
Expand
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application-Layer Protocol Negotiation
BeOS R5.1d0 "Dano/EXP"
Brute-force attack
Certificate authority
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detection of Cache-based Side Channel Attack Based on Performance Counters
Shuanghe Peng
,
Qiao-feng Zhou
,
Jia-li Zhao
2018
Corpus ID: 58910688
Side channel attack is typically used to get private key of cryptography system. It is one type of great threats to the…
Expand
2017
2017
Lightweight Dispatcher Constructions for Control Flow Flattening
Björn Johansson
,
Patrik Lantz
,
M. Liljenstam
2017
Corpus ID: 28744309
The objective of control flow obfuscation is to protect the program control flow from analysis. A technique called control flow…
Expand
2017
2017
An Intelligent Fog Centric Network for IoT-Driven Smart Communities
Nicholas Constant
2017
Corpus ID: 41660310
The Internet of Things (IoT) architecture currently being implemented in commercial applications does not fully realize the…
Expand
2016
2016
Information Hiding in the Public RSA Modulus
S. Wüller
,
Marián Kühnel
,
Ulrike Meyer
2016
Corpus ID: 41816162
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way…
Expand
2015
2015
Prying Open Pandora's Box: KCI Attacks against TLS
Clemens Hlauschek
,
Markus Gruber
,
Florian Fankhauser
,
Christian Schanes
Workshop on Offensive Technologies
2015
Corpus ID: 5976418
Protection of Internet communication is becoming more common in many products, as the demand for privacy in an age of state-level…
Expand
2013
2013
Can a Light Typing Discipline Be Compatible with an Efficient Implementation of Finite Fields Inversion?
D. Canavese
,
Emanuele Cesena
,
Rachid Ouchary
,
M. Pedicini
,
Luca Roversi
International Workshop on Foundational and…
2013
Corpus ID: 46109431
We focus on the fragment TFA of \(\lambda \)-calculus. It contains terms which normalize in polynomial time only. Inside TFA we…
Expand
2013
2013
Securing UDT protocol: Experiences in integrating Transport Layer Security Solutions with UDT
T. Gopal
,
Rahul Jain
,
P. R. L. Eswari
,
G. Jyostna
,
Srinivasa Reddy Kamatham
InTech
2013
Corpus ID: 17935753
UDP based Data Transfer (UDT) protocol has emerged as one of the next-generation high-speed network protocol for transferring…
Expand
2010
2010
Secure wireless communication platform for EV-to-Grid research
Huaqun Guo
,
F. Yu
,
L. Wong
,
Vivy Suhendra
,
Yongdong Wu
International Conference on Wireless…
2010
Corpus ID: 12116861
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to…
Expand
2005
2005
Trusted computing and open source
D. Safford
,
Mimi Zohar
Information Security Technical Report
2005
Corpus ID: 205493234
Review
2003
Review
2003
Radmind: The Integration of Filesystem Integrity Checking with Filesystem Management
W. D. Craig
,
Patrick M. McNeal
LiSA
2003
Corpus ID: 5851813
We review two surveys of large-scale system management, observing common problems across tools and over many years. We also note…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE