Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,348,470 papers from all fields of science
Search
Sign In
Create Free Account
Brute Force
Known as:
Brute Force (hacker text)
Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography. In this book, the author accounts his involvement in the DESCHALL…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Cryptography
DESCHALL Project
Encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Brute Force Works Best Against Bullying
M. Ptaszynski
,
Fumito Masui
,
Yasutomo Kimura
,
Rafal Rzepka
,
K. Araki
CPCR+ITWP@IJCAI
2015
Corpus ID: 15138834
The problem of harmful and offending messages on the Internet has existed for many years. One of the reasons such activities…
Expand
2014
2014
Implementation of Enhanced Security AlgorithmsinMobile Ad hoc Networks
M. Madhurya
,
B. Krishna
,
T. Subhashini
2014
Corpus ID: 55515451
Mobile Ad hoc Networks are wireless infrastructure less networks can be easily formed or deployed due to its simple…
Expand
2014
2014
Brute force absorption contrast microtomography
G. Davis
,
D. Mills
Optics & Photonics - Optical Engineering…
2014
Corpus ID: 120382814
In laboratory X-ray microtomography (XMT) systems, the signal-to-noise ratio (SNR) is typically determined by the X-ray exposure…
Expand
2012
2012
Implementation of Improved DES Algorithm in Securing Smart Card Data
Ariel M. Sison
,
Bartolome T. Tanguilig
,
Bobby D. Gerardo
,
Y. Byun
International Conference on Systems
2012
Corpus ID: 59517331
Although smart cards have already provided secure portable storage device, security is still a major concern to electronic data…
Expand
2012
2012
Brute Force Information Retrieval Experiments using MapReduce
D. Hiemstra
,
C. Hauff
ERCIM News
2012
Corpus ID: 913892
MIREX (MapReduce Information Retrieval Experiments) is a software library initially developed by the Database Group of the…
Expand
2011
2011
Brute Force Attacks
L. Knudsen
,
M. Robshaw
2011
Corpus ID: 60758661
The one attack that can always be mounted against any block cipher is a search for the key. No amount of clever design can…
Expand
Review
2009
Review
2009
Brute force interactions: leveraging intense physical actions in gaming
F. Mueller
,
S. Agamanolis
,
F. Vetere
,
M. Gibbs
Australasian Computer-Human Interaction…
2009
Corpus ID: 10657581
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer…
Expand
2008
2008
Brute Force Attack on Block Cipher Algorithm Based on Distributed Computation
Z. Yuqing
2008
Corpus ID: 63681905
Brute force attack on block cipher algorithm is an important direction of cryptology. Software of brute force attack on block…
Expand
2005
2005
Tactical laser system testing: evolution and challenges
K. Bates
,
F. Kearns
IEEE Autotestcon, .
2005
Corpus ID: 33850169
A key issue in the Fire Control Systems (FCS) test arena is the testing of laser rangefinders, designators, and spot trackers…
Expand
2004
2004
Network selection and discovery of service information in public WLAN hotspots
Yui-Wah Lee
Wireless Mobile Applications and Services on WLAN…
2004
Corpus ID: 18483923
In a public WLAN hotspot, a roaming mobile terminal (MT) may be within radio range of more than one access point (AP), each of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE