OpenSSL

Results: 352



#Item
31Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
32PAPI phpPoA Documentation  PHPPOA DOCUMENTATION PAPI Point of Access in PHP  ~1~

PAPI phpPoA Documentation PHPPOA DOCUMENTATION PAPI Point of Access in PHP ~1~

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2009-04-26 11:47:50
33Tracking Code Patterns over Multiple Software Versions with Herodotos Nicolas Palix DIKU University of Copenhagen Denmark

Tracking Code Patterns over Multiple Software Versions with Herodotos Nicolas Palix DIKU University of Copenhagen Denmark

Add to Reading List

Source URL: coccinelle.lip6.fr

Language: English
34eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1  Institute for Internet Security, University of Applied Sciences Gelsenkirchen

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
35Bachelor’s Thesis : Finding Bugs in Open Source Software using Coccinelle Sune Rievers -  Supervisor: Julia Lawall January 13, 2010

Bachelor’s Thesis : Finding Bugs in Open Source Software using Coccinelle Sune Rievers - Supervisor: Julia Lawall January 13, 2010

Add to Reading List

Source URL: coccinelle.lip6.fr

Language: English
36Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: blu.org

Language: English - Date: 2014-10-02 16:10:38
37Release Notes for Snare Enterprise Agent for MSSQL Release Notes for Snare Enterprise Agent for MSSQL

Release Notes for Snare Enterprise Agent for MSSQL Release Notes for Snare Enterprise Agent for MSSQL

Add to Reading List

Source URL: www.intersectalliance.com

Language: English - Date: 2016-08-10 20:41:50
38Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com.  DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Add to Reading List

Source URL: drownattack.com

Language: English - Date: 2016-07-01 21:14:30
39Transition to DOEGrids CA l l l l l

Transition to DOEGrids CA l l l l l

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-05-14 18:51:50
40Cryptographic software / Key management / Internet security / Transport Layer Security / Cryptography / OpenSSL / Heartbleed / SHA-1 / Key / GNU Privacy Guard / Public-key cryptography / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: blu.org

Language: English - Date: 2014-09-17 23:54:20