Skip to search formSkip to main contentSkip to account menu

OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Side channel attack is typically used to get private key of cryptography system. It is one type of great threats to the… 
2017
2017
The objective of control flow obfuscation is to protect the program control flow from analysis. A technique called control flow… 
2017
2017
The Internet of Things (IoT) architecture currently being implemented in commercial applications does not fully realize the… 
2017
2017
Hedged PKE schemes are designed to provide useful security when the per-message randomness fails to be uniform, say, due to… 
2016
2016
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way… 
2013
2013
We focus on the fragment TFA of \(\lambda \)-calculus. It contains terms which normalize in polynomial time only. Inside TFA we… 
2010
2010
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to… 
2007
2007
Today's society has developed a reliance on networking infrastructures. Health, financial, and many other institutions deploy… 
2006
2006
Common occurrence of server overload and the threat of denial-of-service (DoS) attacks makes highly desirable to improve the… 
2002
2002
"Submitted to The Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for…