Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,150,986 papers from all fields of science
Search
Sign In
Create Free Account
POODLE
Known as:
CVE-2014-3566
, Poodle attack
, Padding Oracle On Downgraded Legacy Encryption
Expand
The POODLE attack (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a man-in-the-middle exploit which takes advantage of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Block cipher mode of operation
Common Vulnerabilities and Exposures
Comparison of TLS implementations
Downgrade attack
Expand
Broader (3)
Cryptography
Internet security
Transport Layer Security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
How Projective is Projective Content? Gradience in Projectivity and At-issueness
Judith Tonhauser
,
D. Beaver
,
Judith Degen
Journal of Semantics
2018
Corpus ID: 53108532
Projective content is utterance content that a speaker may be taken to be committed to even when the expression associated with…
Expand
2014
2014
Scalable self-organizing structured P2P information retrieval model based on equivalence classes
Yaser A. Al-Lahham
,
Mohammad Hassan
˜The œinternational Arab journal of information…
2014
Corpus ID: 8650379
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer Information Retrieval (P2PIR…
Expand
2014
2014
Text Classification Using Association Rules, Dependency Pruning and Hyperonymization
Y. Haralambous
,
P. Lenca
DMNLP@PKDD/ECML
2014
Corpus ID: 14269170
We present new methods for pruning and enhancing itemsets for text classification via association rule mining. Pruning methods…
Expand
2014
2014
Effect of dilution, temperature and pH on the lysis activity of t4 phage against E.coli BL21
M. Taj
,
Jielu Ling
,
+5 authors
Wei Yun-lin
2014
Corpus ID: 6766440
The effect of various “range” of dilution, temperature and pH on T4 bacteriophage lytic activity against Escherichia coli had…
Expand
2009
2009
The Algebra of Lexical Semantics
András Kornai
Mathematics of Language
2009
Corpus ID: 7216258
The current generative theory of the lexicon relies primarily on tools from formal language theory and mathematical logic. Here…
Expand
Review
2004
Review
2004
Rating Transitions and Defaults Conditional on Watchlist, Outlook and Rating History
David T. Hamilton
2004
Corpus ID: 1048673
This report documents the historical rating transition and default rates of Moody's-rated debt issuers conditional on lagged…
Expand
Highly Cited
2003
Highly Cited
2003
Rating the Rating Agencies: Anticipating Currency Crises or Debt Crises?
A. Sy
SSRN Electronic Journal
2003
Corpus ID: 153880582
In contrast to the early-warning system literature, we find that currency and debt crises are not closely linked in emerging…
Expand
Highly Cited
2002
Highly Cited
2002
The effect of temporal distance on level of mental construal.
N. Liberman
,
Michael D. Sagristano
,
Y. Trope
2002
Corpus ID: 7137254
Highly Cited
1996
Highly Cited
1996
LEXICAL ENTRAINMENT IN SPONTANEOUS DIALOG
S. Brennan
1996
Corpus ID: 17276082
It is often desirable to predict or constrain the lexical choices people make with spoken language systems. I discuss lexical…
Expand
Highly Cited
1984
Highly Cited
1984
Only connections: A critique of semantic networks.
P. Johnson-Laird
,
D. Herrmann
,
R. Chaffin
1984
Corpus ID: 15323273
This article examines theories that assume that semantic networks account for the mental representation of meaning. It assesses…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE