Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

POODLE

Known as: CVE-2014-3566, Poodle attack, Padding Oracle On Downgraded Legacy Encryption 
The POODLE attack (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a man-in-the-middle exploit which takes advantage of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer Information Retrieval (P2PIR… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2014
2014
type="main" xml:lang="en"> This article analyzes the interconnectedness between reinsurers and U.S. property–casualty (P/C… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2014
2014
The effect of various “range” of dilution, temperature and pH on T4 bacteriophage lytic activity against Escherichia coli had… Expand
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
 
Is this relevant?
2014
2014
Different people may describe the same object in different ways, and at varied levels of granularity (“poodle”, “dog”, “pet” or… Expand
  • table 1
  • figure 1
Is this relevant?
2013
2013
ABSTRACT: Inhibition performance of Lornoxicam & Tenoxicam against corrosion of carbon steel in 1 MH 2 SO 4 solutions was… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Urban legends are plausible stories—told as truths—that revolve around the complexities and challenges of modern life. Such… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In contrast to the early-warning system literature, we find that currency and debt crises are not closely linked in emerging… Expand
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Abstract Four studies examined the prediction of construal level theory that the more distant future events would be construed in… Expand
  • figure 1
  • figure 2
Is this relevant?
2000
2000
Over the past decade, distributed computing necessitated a centralized support environment at most colleges and universities… Expand
Is this relevant?