Serialization Security, Binary Protocols, Data Interchange, Schema Validation
CBOR ε MsgPack ζ―δΈεδΊ
blog.est.imΒ·2d
Edge cases in DNSSEC validation with multiple algorithms
blog.apnic.netΒ·16h
Sex offenders, terrorists, drug dealers, exposed in spyware breach
malwarebytes.comΒ·3h
Working at ABI boundaries
rkrishnan.orgΒ·1d
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.ukΒ·20h
Halo2's Elegant Transcript As Proof
cryptologie.netΒ·1d
Loading...Loading more...