{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:44:15Z","timestamp":1775745855333,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1514163,CNS-1564102"],"award-info":[{"award-number":["CNS-1514163,CNS-1564102"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354229","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1387-1403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Protocols for Checking Compromised Credentials"],"prefix":"10.1145","author":[{"given":"Lucy","family":"Li","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Bijeeta","family":"Pal","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Junade","family":"Ali","sequence":"additional","affiliation":[{"name":"Cloudflare Inc., London, United Kingdom"}]},{"given":"Nick","family":"Sullivan","sequence":"additional","affiliation":[{"name":"Cloudflare Inc., San Francisco, CA, USA"}]},{"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison &amp; Cornell Tech, Madison, WI, USA"}]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"4iQ. 2018. Identities in the Wild: The Tsunami of Breached Identities Continues. https:\/\/4iq.com\/wp-content\/uploads\/2018\/05\/2018_IdentityBreachReport_4iQ.pdf\/. (2018).  4iQ. 2018. Identities in the Wild: The Tsunami of Breached Identities Continues. https:\/\/4iq.com\/wp-content\/uploads\/2018\/05\/2018_IdentityBreachReport_4iQ.pdf\/. (2018)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0010"},{"key":"e_1_3_2_2_3_1","unstructured":"Junade Ali. 2018a. Optimising Caching on Pwned Passwords (with Workers). https:\/\/blog.cloudflare.com\/optimising-caching-on-pwnedpasswords. (2018).  Junade Ali. 2018a. Optimising Caching on Pwned Passwords (with Workers). https:\/\/blog.cloudflare.com\/optimising-caching-on-pwnedpasswords. (2018)."},{"key":"e_1_3_2_2_4_1","unstructured":"Junade Ali. 2018b. Validating Leaked Passwords with k-Anonymity. https:\/\/blog.cloudflare.com\/validating-leaked-passwords-with-k-anonymity\/. (2018).  Junade Ali. 2018b. Validating Leaked Passwords with k-Anonymity. https:\/\/blog.cloudflare.com\/validating-leaked-passwords-with-k-anonymity\/. (2018)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.023"},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/medium.com\/4iqdelvedeep\/1--4-billion-clear-text-credentials-discovered-in-a-single-database-3131d0a1ae14. (","author":"Casal Julio","year":"2017"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_2_9_1","first-page":"23","article-title":"The Tangled Web of Password Reuse","volume":"14","author":"Das Anupam","year":"2014","journal-title":"NDSS"},{"key":"e_1_3_2_2_10_1","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Eurocrypt","author":"Dodis Y.","year":"2004"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746546"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_2_13_1","unstructured":"Verizon Enterprise. 2017. 2017 Data breach investigations report. (2017).  Verizon Enterprise. 2017. 2017 Data breach investigations report. (2017)."},{"key":"e_1_3_2_2_14_1","volume-title":"Efficient private matching and set intersection. Advances in Cryptography--EUROCRYPT","author":"Freedman Michael J"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0044"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i1.277-313"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10022"},{"key":"e_1_3_2_2_22_1","unstructured":"William Melicher Blase Ur Sean M Segreti Saranga Komanduri Lujo Bauer Nicolas Christin and Lorrie Faith Cranor. Fast lean and accurate: Modeling password guessability using neural networks.  William Melicher Blase Ur Sean M Segreti Saranga Komanduri Lujo Bauer Nicolas Christin and Lorrie Faith Cranor. Fast lean and accurate: Modeling password guessability using neural networks."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 158--172","author":"Olumofin Femi","year":"2011"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00056"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133973"},{"key":"e_1_3_2_2_27_1","volume-title":"Phasing: Private set intersection using permutation-based hashing. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 515--530.","author":"Pinkas Benny","year":"2015"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"e_1_3_2_2_29_1","unstructured":"Jennifer Pullman Kurt Thomas and Elie Bursztein. 2019. Protect your accounts from data breaches with Password Checkup. https:\/\/security.googleblog.com\/2019\/02\/protect-your-accounts-from-data.html. (2019).  Jennifer Pullman Kurt Thomas and Elie Bursztein. 2019. Protect your accounts from data breaches with Password Checkup. https:\/\/security.googleblog.com\/2019\/02\/protect-your-accounts-from-data.html. (2019)."},{"key":"e_1_3_2_2_30_1","volume-title":"USENIX Security Symposium. USENIX.","author":"Thomas Kurt","year":"2019"},{"key":"e_1_3_2_2_31_1","unstructured":"Troy Hunt. 2018. Have I Been Pwned? https:\/\/haveibeenpwned.com\/Passwords\/. (2018).  Troy Hunt. 2018. Have I Been Pwned? https:\/\/haveibeenpwned.com\/Passwords\/. (2018)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_2_33_1","volume-title":"Proc. USENIX Security.","author":"Wheeler Dan Lowe","year":"2016"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_23"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315316"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354229","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354229","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":35,"alternative-id":["10.1145\/3319535.3354229","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354229","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}