We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

wolfSSL 2013 Technical and Community Update

00:00

Formal Metadata

Title
wolfSSL 2013 Technical and Community Update
Title of Series
Number of Parts
199
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
wolfSSL, author of the open source CyaSSL embedded SSL library has made significant progress in 2013 towards bringing the community a more usable, feature-rich, and better supported library for use in an ever-growing range of embedded platforms and environments. This talk will provide an overview of technical progress in the last year and news on the current state of wolfSSL. Details on what's new include the addition of new crypto ciphers and algorithms, better hardware cryptography support, more flexible abstraction layers, a JNI wrapper, new platform support, and better development tool integration.
Cellular automatonProduct (business)BitArithmetic progressionGoodness of fitCryptographySoftware developerLecture/Conference
Library (computing)Proxy serverInternetworkingOpen sourceSemiconductor memoryServer (computing)Connected spaceCellular automatonMultiplication signWeb 2.0NumberCryptographyWrapper (data mining)Operator (mathematics)Enterprise architectureGroup actionPoint (geometry)ScreensaverSinc functionProcess (computing)SubsetProduct (business)Compiler1 (number)QuantumAlgorithmInformation securityTotal S.A.Different (Kate Ryan album)Sign (mathematics)Projective planeFood energyComputer-generated imageryMathematical analysisCloud computingCASE <Informatik>TelecommunicationElectronic mailing listEscape characterImplementationComputer configurationModul <Datentyp>Vector potentialPlanningComputer fileStandard deviationEncryptionPower (physics)PlastikkarteEmailLine (geometry)Single sign-onOperating systemPublic-key cryptographyTransport Layer SecurityLevel (video gaming)BitFiber bundleSource codeSuite (music)Streaming mediaXMLUML
Product (business)Physical systemImplementationComputer configurationRow (database)Wrapper (data mining)Communications protocolInformation securityDefault (computer science)Level (video gaming)Vulnerability (computing)Java appletRevision controlBitHash functionEndliche ModelltheorieComputing platformLibrary (computing)Client (computing)Software developerBand matrixTransport Layer SecurityOcean currentMultiplication signPatch (Unix)Maxima and minimaMereologyBuffer solutionServer (computing)SoftwareWebsitePublic key certificateDifferent (Kate Ryan album)Extension (kinesiology)AuthenticationCellular automatonFlagSemiconductor memoryRule of inferenceService (economics)Price indexLengthFrame problemPoint (geometry)Water vaporInverse elementEncryptionMessage passingCycle (graph theory)Open sourceCryptographyProcedural programmingXMLComputer animation
Computer fileScripting languageService (economics)Functional (mathematics)Line (geometry)Physical lawPublic key certificateAsynchronous Transfer ModeInclusion mapSpacetimeContext awarenessCellular automatonKey (cryptography)BitPressureAdditionInternet service providerEndliche ModelltheorieImplementationGroup actionBenchmarkMathematical optimizationBuffer solutionLink (knot theory)Operator (mathematics)AxiomProcess (computing)Social classLibrary (computing)Standard deviationProjective planeSign (mathematics)CryptographyFiber bundleMessage passingCycle (graph theory)MathematicsProduct (business)DeciphermentRule of inferenceMemory managementArithmetic progressionComputing platformCybersexAnalytic continuationStack (abstract data type)RadiusCombinational logicMultiplication signDisk read-and-write headLatent heatAreaSet (mathematics)InformationTrailFormal verificationEncryptionModule (mathematics)Semiconductor memoryComputing platformComputer hardwareType theoryAtomic numberRow (database)Operating systemSuite (music)Electronic program guideBlock (periodic table)Cache (computing)Public-key cryptographyComputer configurationCompilerClient (computing)XML
NumberProcess (computing)Pairwise comparisonLibrary (computing)Information technology consultingSoftware testingSoftwareBitCryptographyProgrammer (hardware)EmailComputer hardwareValidity (statistics)WebsiteFeedbackRevision controlGraph (mathematics)Random number generationOpen sourceOperator (mathematics)Enterprise architectureMultiplication signSoftware developerImplementationModule (mathematics)CodeIntegrated development environmentRoundingDefault (computer science)Source codeComputer programmingLength of stayService (economics)Server (computing)Cellular automatonOffice suiteMereologyComputer clusterPopulation densityStandard deviationDirection (geometry)Thread (computing)CuboidSimilarity (geometry)ArmMathematical analysisLattice (order)Point (geometry)Scripting languageElement (mathematics)Endliche ModelltheorieWater vaporStack (abstract data type)AngleComputing platformOperating systemGroup action
Turing testMultiplication signSoftware developerFunction (mathematics)Open sourceoutputPublic key certificateCASE <Informatik>SummierbarkeitData managementDifferent (Kate Ryan album)Message passingCommunications protocolBitXMLLecture/Conference
Transcript: English(auto-generated)