Brute Force

Results: 111



#Item
51Field-programmable gate array / Xilinx / Symmetric-key algorithm / Key / Public-key cryptography / Block cipher / Brute-force attack / Partial re-configuration / Cryptography / Key management / Reconfigurable computing

Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable Device

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-06-04 18:22:14
52Coding theory / Analysis of algorithms / Computational complexity theory / Closest string / Hamming distance / Time complexity / Algorithmica / Theoretical computer science / Applied mathematics / NP-complete problems

Local Search for String Problems: Brute Force is Essentially Optimal Jiong Guo, Danny Hermelin, Christian Komusiewicz Universit¨ at des Saarlandes, Ben-Gurion University, TU Berlin & Universit´

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2013-07-26 10:03:32
53Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

Add to Reading List

Source URL: www.enck.org

Language: English
54Computer network security / Software testing / Metasploit Project / Rapid7 / Exploit / Penetration test / Attack / Brute-force attack / Evasion / Software / Computer security / Cyberwarfare

Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing better

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-08-27 14:54:18
55Data mining / Machine learning / Search algorithms / Cluster analysis / Image processing / Hierarchical clustering / Nearest neighbor search / UPGMA / Single-linkage clustering / Statistics / Mathematics / Information science

Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs David Eppstein∗ Abstract dynamic closest pair problem. It can be solved by brute force 2 We develop data structures for dynamic closest pair

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 1997-11-20 19:58:04
56Fire protection / Safety / Firefighting in the United States / Ansul / Marinette County /  Wisconsin / Fire suppression system / Safety equipment / Fire extinguisher / Tank / Fire suppression / Active fire protection / Building automation

TOUGH CUSTOMERS Mobile Equipment Fire Suppression Systems PROTECTING HEAVY EQUIPMENT CALLS FOR BRUTE FORCE Before the introduction of ANSUL® vehicle fire

Add to Reading List

Source URL: torvacsolutions.com.au

Language: English - Date: 2014-01-31 22:04:44
57Berkeley Open Infrastructure for Network Computing / Denis Diderot / Eight queens puzzle / Weird number / Brute-force search / Mathematics / Software / Yoyo@home

Paralellizing large search in BOINC: a case study Wenjie Fang, Universit´e Paris Diderot in co-operation with yoyo@home BOINC Workshop 2013, Grenoble, France

Add to Reading List

Source URL: boinc.berkeley.edu

Language: English - Date: 2013-09-25 09:46:57
58Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni [removed] University of Zagreb, Croatia

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2014-07-23 00:08:16
59Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
60Geodesy / Avionics / Surveying / Global Positioning System / Satellite navigation / Mathematical optimization / Brute-force search / Technology / Satellite navigation systems / Navigation

348 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 37, NO. 3, JULY 2012 Peer-Reviewed Technical Communication Instantaneous Global Navigation Satellite System (GNSS)-Based

Add to Reading List

Source URL: saegnss1.curtin.edu.au

Language: English - Date: 2012-08-28 02:10:58
UPDATE