Author of the publication

Might I Get Pwned: A Second Generation Compromised Credential Checking Service.

, , , , , , , , and . USENIX Security Symposium, page 1831-1848. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guarding Serverless Applications with SecLambda., , , , and . CoRR, (2020)Pancake: Frequency Smoothing for Encrypted Data Stores., , , , , , and . USENIX Security Symposium, page 2451-2468. USENIX Association, (2020)Care Infrastructures for Digital Security in Intimate Partner Violence., , , , , and . CHI, page 123:1-123:20. ACM, (2022)A Fast and Simple Partially Oblivious PRF, with Applications., , , , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 674-705. Springer, (2022)The Many Kinds of Creepware Used for Interpersonal Attacks., , , , , , and . SP, page 626-643. IEEE, (2020)Trauma-Informed Computing: Towards Safer Technology Experiences for All., , , , , , , , and . CHI, page 544:1-544:20. ACM, (2022)Araña: Discovering and Characterizing Password Guessing Attacks in Practice., , , , and . USENIX Security Symposium, page 1019-1036. USENIX Association, (2023)Orca: Blocklisting in Sender-Anonymous Messaging., , , and . IACR Cryptol. ePrint Arch., (2021)SoK: Hate, Harassment, and the Changing Landscape of Online Abuse., , , , , , , , , and 4 other author(s). SP, page 247-267. IEEE, (2021)Blind Certificate Authorities., , , , and . IEEE Symposium on Security and Privacy, page 1015-1032. IEEE, (2019)