{"id":3163,"date":"2024-12-23T13:06:26","date_gmt":"2024-12-23T12:06:26","guid":{"rendered":"https:\/\/trustlab.upct.es\/2024\/12\/23\/who-is-the-best-singer-on-chart-know-him\/"},"modified":"2025-09-18T22:08:04","modified_gmt":"2025-09-18T20:08:04","slug":"optimizing-security-cuckoo-filters-in-password-audits","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2024\/12\/23\/optimizing-security-cuckoo-filters-in-password-audits\/","title":{"rendered":"Optimizing Security: Cuckoo Filters in Password Audits"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3163\" class=\"elementor elementor-3163 elementor-1169\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d4a5770 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"6d4a5770\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-733f6ad7 elementor-widget elementor-widget-text-editor\" data-id=\"733f6ad7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This article presents how Cuckoo filters can revolutionize password audits, making them faster and more efficient. Through comparative tests, the results show a significant improvement in terms of time and memory consumption over other data structures. The proposal has key applications in defensive cybersecurity, forensic audits and the development of more robust systems against credential-based attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94826f0 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"94826f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8415204 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8415204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/doi.org\/10.1186\/s42400-023-00193-6\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View publication<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This article presents how Cuckoo filters can revolutionize password audits, making them faster and more efficient. Through comparative tests, the results show a significant improvement in terms of time and memory consumption over other data structures. The proposal has key applications in defensive cybersecurity, forensic audits and the development of more robust systems against credential-based [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2779,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[],"class_list":["post-3163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3163"}],"version-history":[{"count":4,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3163\/revisions"}],"predecessor-version":[{"id":3173,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3163\/revisions\/3173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/2779"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}