Skip to search formSkip to main contentSkip to account menu

OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Side channel attack is typically used to get private key of cryptography system. It is one type of great threats to the… 
2017
2017
The objective of control flow obfuscation is to protect the program control flow from analysis. A technique called control flow… 
2017
2017
The Internet of Things (IoT) architecture currently being implemented in commercial applications does not fully realize the… 
2016
2016
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way… 
2015
2015
Protection of Internet communication is becoming more common in many products, as the demand for privacy in an age of state-level… 
2013
2013
We focus on the fragment TFA of \(\lambda \)-calculus. It contains terms which normalize in polynomial time only. Inside TFA we… 
2013
2013
UDP based Data Transfer (UDT) protocol has emerged as one of the next-generation high-speed network protocol for transferring… 
2010
2010
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to… 
Review
2003
Review
2003
We review two surveys of large-scale system management, observing common problems across tools and over many years. We also note…