Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1905.13737
Cited By
v1
v2
v3 (latest)
Protocols for Checking Compromised Credentials
31 May 2019
Lucy Li
Bijeeta Pal
Junade Ali
N. Sullivan
Rahul Chatterjee
Thomas Ristenpart
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Protocols for Checking Compromised Credentials"
10 / 10 papers shown
Title
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas
Sarah Meiklejohn
Michael A. Specter
Xiang Wang
Xavier Llorà
Stephan Somogyi
D. Kleidermacher
64
2
0
06 Apr 2023
A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Philipp Markert
Andrick Adhikari
Sanchari Das
42
6
0
02 Feb 2023
SoK: SCT Auditing in Certificate Transparency
Sarah Meiklejohn
Joe DeBlasio
Devon O'Brien
Christopher Thompson
Kevin Yeo
Emily Stark
21
12
0
03 Mar 2022
Might I Get Pwned: A Second Generation Compromised Credential Checking Service
Bijeeta Pal
Mazharul Islam
M. Bohuk
N. Sullivan
Luke Valenta
Tara Whalen
Christopher A. Wood
Thomas Ristenpart
Rahul Chatterjee
124
27
0
29 Sep 2021
PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising
M. Mughees
Gonccalo Pestana
Alex Davidson
B. Livshits
18
7
0
16 Sep 2021
Increasing Adversarial Uncertainty to Scale Private Similarity Testing
Yiqing Hua
Armin Namavari
Kai-Wen Cheng
Mor Naaman
Thomas Ristenpart
45
5
0
03 Sep 2021
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
Jeremiah Blocki
Peiyuan Liu
47
3
0
29 May 2021
Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols
Junade Ali
Vladimir Dyo
56
11
0
26 May 2020
Practical Hash-based Anonymity for MAC Addresses
Junade Ali
Vladimir Dyo
32
9
0
13 May 2020
Detecting stuffing of a user's credentials at her own accounts
K. Wang
Michael K. Reiter
99
23
0
23 Dec 2019
1