暂无分享,去创建一个
[1] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[2] Sean M. Randall,et al. Evaluation of approximate comparison methods on Bloom filters for probabilistic linkage , 2019, International journal of population data science.
[3] Elizabeth Stobert,et al. The Password Life Cycle: User Behaviour in Managing Passwords , 2014, SOUPS.
[4] Benny Pinkas,et al. Analysis of the Linux random number generator , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[6] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[7] Anne-Marie Kermarrec,et al. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters , 2012, SSS.
[8] Wei Wang,et al. GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation , 2018, 2018 IEEE International Conference on Communications (ICC).
[9] Chris Clifton,et al. Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.
[10] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[11] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[12] Helen Meyer,et al. Constructing difficult-to-guess passwords , 1996 .
[13] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[14] Rainer Schnell,et al. Bmc Medical Informatics and Decision Making Privacy-preserving Record Linkage Using Bloom Filters , 2022 .
[15] Jung Hee Cheon,et al. Homomorphic Computation of Edit Distance , 2015, IACR Cryptol. ePrint Arch..
[16] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.