Brute Force

Results: 111



#Item
1

Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-28 19:09:23
    2

    COMPUTATIONAL SECURITY AND THE ECONOMICS OF PASSWORD HACKING Abstract Given the recent rise of cloud computing at cheap prices and the increase in cheap parallel computing options, brute force attacks against stolen pass

    Add to Reading List

    Source URL: courses.csail.mit.edu

    Language: English
      3

      DON’T TRY TO BREAK US– WE’LL EXPLODE The 2017 G20 and the Battle of Hamburg: A Full Account and Analysis Executive summary: The police attempted to use brute force to

      Add to Reading List

      Source URL: cloudfront.crimethinc.com

      - Date: 2017-09-13 01:22:53
        4Mathematics / Statistics / Applied mathematics / Data mining / Search algorithms / Approximation algorithms / Discrete geometry / Nearest neighbor search / Numerical analysis / Hierarchical clustering / Cluster analysis / K-means clustering

        Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs David Eppstein∗ Abstract dynamic closest pair problem. It can be solved by brute force 2 We develop data structures for dynamic closest pair

        Add to Reading List

        Source URL: bioinfo.ict.ac.cn

        Language: English - Date: 2014-11-28 11:05:21
        5Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

        Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-08-21 11:38:22
        6Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-06-22 08:29:01
        7Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

        DNSSEC Key Maintenance Analysis_final

        Add to Reading List

        Source URL: www.nlnetlabs.nl

        Language: English - Date: 2009-06-27 06:07:09
        8Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

        Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

        Add to Reading List

        Source URL: hdm.io

        Language: English - Date: 2015-12-05 20:38:27
        9Compiler optimizations / Search algorithms / Arrays / Global value numbering / Static single assignment form / Hash function / Hash table / Algorithm / Lookup table / Congruence

        This talk is divided into 7 parts. Part 1 begins with a quick look at the SSA optimization framework and global value numbering. Part 2 describes a well known brute force algorithm for GVN. Part 3 modifies this to arriv

        Add to Reading List

        Source URL: www.sable.mcgill.ca

        Language: English - Date: 2009-03-09 09:18:56
        10NP-complete problems / Computational complexity theory / Analysis of algorithms / Operations research / NP-hard problems / Vertex cover / Travelling salesman problem / Dynamic programming / Parameterized complexity / Independent set / Algorithm / 2-satisfiability

        CS261: A Second Course in Algorithms Lecture #19: Beating Brute-Force Search∗ Tim Roughgarden† March 8, 2016 A popular myth is that, for N P -hard problems, there are no algorithms with worst-case running time better

        Add to Reading List

        Source URL: theory.stanford.edu

        Language: English - Date: 2016-03-15 10:47:56
        UPDATE