Skip to search formSkip to main contentSkip to account menu

POODLE

Known as: CVE-2014-3566, Poodle attack, Padding Oracle On Downgraded Legacy Encryption 
The POODLE attack (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a man-in-the-middle exploit which takes advantage of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Projective content is utterance content that a speaker may be taken to be committed to even when the expression associated with… 
2014
2014
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer Information Retrieval (P2PIR… 
2014
2014
We present new methods for pruning and enhancing itemsets for text classification via association rule mining. Pruning methods… 
2014
2014
The effect of various “range” of dilution, temperature and pH on T4 bacteriophage lytic activity against Escherichia coli had… 
2009
2009
The current generative theory of the lexicon relies primarily on tools from formal language theory and mathematical logic. Here… 
Review
2004
Review
2004
This report documents the historical rating transition and default rates of Moody's-rated debt issuers conditional on lagged… 
Highly Cited
2003
Highly Cited
2003
  • A. Sy
  • SSRN Electronic Journal
  • 2003
  • Corpus ID: 153880582
In contrast to the early-warning system literature, we find that currency and debt crises are not closely linked in emerging… 
Highly Cited
1996
Highly Cited
1996
It is often desirable to predict or constrain the lexical choices people make with spoken language systems. I discuss lexical… 
Highly Cited
1984
Highly Cited
1984
This article examines theories that assume that semantic networks account for the mental representation of meaning. It assesses…