Brute Force

Results: 111



#Item
61Science / Technology / Virtual reality / Human communication / Scientific revolution / Brute Force / Contact sport / Interaction design / User interface / Human–computer interaction / Human–computer interaction / Technical communication

Brute Force as Input for Networked Gaming

Add to Reading List

Source URL: www.agamanolis.com

Language: English - Date: 2012-07-16 23:28:12
62Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
63Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
64Outline of chess / Rules of chess / Computer chess / Draw / Go / Queen / Chess variant / Mizar chess engine / Games / Chess / Abstract strategy games

3 4 BRUTE-FORCE / SELECTIVE SEARCH ALGORITHM

Add to Reading List

Source URL: www.chesshouse.com

Language: English - Date: 2013-02-25 15:31:01
65Planar graphs / NP-complete problems / Tree decomposition / Minor / Apex graph / Graph / Clique-sum / Neighbourhood / Vertex cover / Graph theory / Theoretical computer science / Graph operations

Local Search: Is Brute-Force Avoidable?

Add to Reading List

Source URL: ijcai.org

Language: English - Date: 2009-06-22 08:17:00
66Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
67Procedural generation / Algorithm / Prime number / Brute-force search / Applied mathematics / Mathematics / Theoretical computer science / Search algorithms

A Trace-based Framework for Analyzing and Synthesizing Educational Progressions Erik Andersen1 , Sumit Gulwani2 , and Zoran Popovi´c1 2 1 Microsoft Research

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-01-26 03:38:35
68Espionage / SSL acceleration / Denial-of-service attack / Password / Online banking / Brute-force attack / Internet security / Computer network security / Cyberwarfare / Computer security

Operation Ababil Phase 3 Attack Report Background The week of March 11th, has started a new wave of DDoS attacks on banks and financial institutions. Qassam Cyber Fighters have launched the 3rd phase of Operation Ababil

Add to Reading List

Source URL: www.securitydam.com

Language: English - Date: 2013-03-24 09:13:02
69Distributed computing architecture / MapReduce / Search algorithms / Apache Hadoop / Algorithm / Accumulator / Inverted index / Embarrassingly parallel / Concurrent computing / Computing / Parallel computing

Brute Force and Indexed Approaches to Pairwise Document Similarity Comparisons with MapReduce Jimmy Lin The iSchool, College of Information Studies, University of Maryland National Center for Biotechnology Information, U

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2009-05-07 09:10:16
70Computer network security / Software testing / Metasploit Project / Rapid7 / Exploit / Penetration test / Attack / Brute-force attack / Evasion / Software / Computer security / Cyberwarfare

Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing better

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-12-15 17:35:01
UPDATE