ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.13737
  4. Cited By
Protocols for Checking Compromised Credentials
v1v2v3 (latest)

Protocols for Checking Compromised Credentials

31 May 2019
Lucy Li
Bijeeta Pal
Junade Ali
N. Sullivan
Rahul Chatterjee
Thomas Ristenpart
ArXiv (abs)PDFHTML

Papers citing "Protocols for Checking Compromised Credentials"

10 / 10 papers shown
Title
Robust, privacy-preserving, transparent, and auditable on-device
  blocklisting
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas
Sarah Meiklejohn
Michael A. Specter
Xiang Wang
Xavier Llorà
Stephan Somogyi
D. Kleidermacher
64
2
0
06 Apr 2023
A Transcontinental Analysis of Account Remediation Protocols of Popular
  Websites
A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Philipp Markert
Andrick Adhikari
Sanchari Das
42
6
0
02 Feb 2023
SoK: SCT Auditing in Certificate Transparency
SoK: SCT Auditing in Certificate Transparency
Sarah Meiklejohn
Joe DeBlasio
Devon O'Brien
Christopher Thompson
Kevin Yeo
Emily Stark
23
12
0
03 Mar 2022
Might I Get Pwned: A Second Generation Compromised Credential Checking
  Service
Might I Get Pwned: A Second Generation Compromised Credential Checking Service
Bijeeta Pal
Mazharul Islam
M. Bohuk
N. Sullivan
Luke Valenta
Tara Whalen
Christopher A. Wood
Thomas Ristenpart
Rahul Chatterjee
124
27
0
29 Sep 2021
PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving
  Advertising
PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising
M. Mughees
Gonccalo Pestana
Alex Davidson
B. Livshits
20
7
0
16 Sep 2021
Increasing Adversarial Uncertainty to Scale Private Similarity Testing
Increasing Adversarial Uncertainty to Scale Private Similarity Testing
Yiqing Hua
Armin Namavari
Kai-Wen Cheng
Mor Naaman
Thomas Ristenpart
47
5
0
03 Sep 2021
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
Jeremiah Blocki
Peiyuan Liu
47
3
0
29 May 2021
Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing
  Protocols
Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols
Junade Ali
Vladimir Dyo
56
11
0
26 May 2020
Practical Hash-based Anonymity for MAC Addresses
Practical Hash-based Anonymity for MAC Addresses
Junade Ali
Vladimir Dyo
32
9
0
13 May 2020
Detecting stuffing of a user's credentials at her own accounts
Detecting stuffing of a user's credentials at her own accounts
K. Wang
Michael K. Reiter
99
23
0
23 Dec 2019
1