The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics
Modern password guessing attacks adopt sophisticated prob-abilistic techniques that allow for orders...
A flexible conformal inference method is developed to construct confidence intervals for the frequen...
Recent literature proposes the use of a proactive password checker as method for preventing users fr...
International audienceConservative Count-Min, a stronger version of the popular Count-Min sketch [Co...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
The estimation of the frequency of the elements on a set is needed in a wide range of computing appl...
The estimation of the frequency of the elements on a set is needed in a wide range of computing appl...
The Count-Min (CM) Sketch is a compact summary data structure capable of representing a high-dimensi...
In this paper we will look at the distribution with which passwords are chosen. Zipf’s Law is comm...
Frequency estimation data structures such as the count-min sketch (CMS) have found numerous applicat...
Similarity is a vague concept which can be treated in a quantitative manner only using appropriate m...
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow for orders ...
In spite of the growing adoption of two factor authentication systems, sometimes combined with hardw...
The editor's version is available for free until November 03, 2022: https://authors.elsevier.com/c/1...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Modern password guessing attacks adopt sophisticated prob-abilistic techniques that allow for orders...
A flexible conformal inference method is developed to construct confidence intervals for the frequen...
Recent literature proposes the use of a proactive password checker as method for preventing users fr...
International audienceConservative Count-Min, a stronger version of the popular Count-Min sketch [Co...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
The estimation of the frequency of the elements on a set is needed in a wide range of computing appl...
The estimation of the frequency of the elements on a set is needed in a wide range of computing appl...
The Count-Min (CM) Sketch is a compact summary data structure capable of representing a high-dimensi...
In this paper we will look at the distribution with which passwords are chosen. Zipf’s Law is comm...
Frequency estimation data structures such as the count-min sketch (CMS) have found numerous applicat...
Similarity is a vague concept which can be treated in a quantitative manner only using appropriate m...
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow for orders ...
In spite of the growing adoption of two factor authentication systems, sometimes combined with hardw...
The editor's version is available for free until November 03, 2022: https://authors.elsevier.com/c/1...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Modern password guessing attacks adopt sophisticated prob-abilistic techniques that allow for orders...
A flexible conformal inference method is developed to construct confidence intervals for the frequen...
Recent literature proposes the use of a proactive password checker as method for preventing users fr...