Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Brute Force

Known as: Brute Force (hacker text) 
Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography. In this book, the author accounts his involvement in the DESCHALL… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The guesswork problem was originally motivated by a desire to quantify computational security for single user systems. Leveraging… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security… Expand
  • table I
  • table II
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Acknowledgments xi Introduction e How to Have Less Crime and Less Punishment 1 Chapter 1: The Trap 8 Chapter 2: Thinking about… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper explores the problem of computing pairwise similarity on document collections, focusing on the application of "more… Expand
  • figure 1
  • figure 3
  • figure 6
  • figure 7
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Piezoelectric crystalline films which consist essentially of a crystalline zinc oxide film with a c-axis perpendicular to a… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The ability to dynamically discover and invoke a Web service is a critical aspect of service oriented architectures. An important… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We initiate a general approach for the fast enumeration of permutations with a prescribed number of occurrences of “forbidden… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Abstract : Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety… Expand
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The number, size, and user population of bibliographic and full-text document databases are rapidly growing. With a high document… Expand
  • figure 5
Is this relevant?
Highly Cited
1993
Highly Cited
1993
A three-dimensional (3-D) version of the nested equivalent principle algorithm (NEPAL) is presented. In 3-D, a scatterer is first… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?