Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Brute Force

Known as: Brute Force (hacker text) 
Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography. In this book, the author accounts his involvement in the DESCHALL… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The guesswork problem was originally motivated by a desire to quantify computational security for single user systems. Leveraging… Expand
  • figure 1
  • figure 2
  • figure 3
2014
2014
The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security… Expand
  • table I
  • table II
  • figure 1
Highly Cited
2009
Highly Cited
2009
This paper explores the problem of computing pairwise similarity on document collections, focusing on the application of "more… Expand
  • figure 1
  • figure 3
  • figure 6
  • figure 7
  • table 1
Highly Cited
2007
Highly Cited
2007
Piezoelectric crystalline films which consist essentially of a crystalline zinc oxide film with a c-axis perpendicular to a… Expand
Highly Cited
2007
Highly Cited
2007
The ability to dynamically discover and invoke a Web service is a critical aspect of service oriented architectures. An important… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1996
Highly Cited
1996
We initiate a general approach for the fast enumeration of permutations with a prescribed number of occurrences of “forbidden… Expand
Review
1995
Review
1995
More than a dozen papers analyzing the COBE data have now appeared. We review the different techniques and compare them to a… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1994
Highly Cited
1994
These lectures describe the implementation of optimization techniques based on control theory for airfoil and wing design. In… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
1994
Highly Cited
1994
The number, size, and user population of bibliographic and full-text document databases are rapidly growing. With a high document… Expand
  • figure 5
Highly Cited
1993
Highly Cited
1993
A three-dimensional (3-D) version of the nested equivalent principle algorithm (NEPAL) is presented. In 3-D, a scatterer is first… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5