{"id":"https://openalex.org/W298395203","doi":"https://doi.org/10.1007/978-3-662-45526-5_25","title":"How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse","display_name":"How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W298395203","doi":"https://doi.org/10.1007/978-3-662-45526-5_25","mag":"298395203"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-45526-5_25","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-45526-5_25","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01342187","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102895187","display_name":"Yang Cheng","orcid":"https://orcid.org/0000-0003-3285-5794"},"institutions":[{"id":"https://openalex.org/I204831749","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822","country_code":"CN","type":"education","lineage":["https://openalex.org/I204831749"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Cheng","raw_affiliation_strings":["School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu, 611130, China"],"affiliations":[{"raw_affiliation_string":"School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu, 611130, China","institution_ids":["https://openalex.org/I204831749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052565646","display_name":"Qi Zhao","orcid":"https://orcid.org/0000-0001-9713-1864"},"institutions":[{"id":"https://openalex.org/I204831749","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822","country_code":"CN","type":"education","lineage":["https://openalex.org/I204831749"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhao Qi","raw_affiliation_strings":["Southwestern University of Finance and Economics  Chengdu China"],"affiliations":[{"raw_affiliation_string":"Southwestern University of Finance and Economics  Chengdu China","institution_ids":["https://openalex.org/I204831749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102895187"],"corresponding_institution_ids":["https://openalex.org/I204831749"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10559959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"264","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.908155620098114},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7066141366958618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6248076558113098},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.5289117097854614},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4723038673400879},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4510561227798462},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.4465484619140625},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.39370959997177124},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.28061947226524353},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1385129690170288}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.908155620098114},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7066141366958618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6248076558113098},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.5289117097854614},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4723038673400879},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4510561227798462},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.4465484619140625},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.39370959997177124},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.28061947226524353},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1385129690170288},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-662-45526-5_25","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-45526-5_25","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01342187v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01342187","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"13th Conference on e-Business, e-Services and e-Society (I3E), Nov 2014, Sanya, China. pp.264-276, &#x27E8;10.1007/978-3-662-45526-5_25&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01342187v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01342187","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"13th Conference on e-Business, e-Services and e-Society (I3E), Nov 2014, Sanya, China. pp.264-276, &#x27E8;10.1007/978-3-662-45526-5_25&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1582830784","https://openalex.org/W1976461132","https://openalex.org/W2025448348","https://openalex.org/W2030959655","https://openalex.org/W2030993695","https://openalex.org/W2058491602","https://openalex.org/W2066345778","https://openalex.org/W2080047844","https://openalex.org/W2104773223","https://openalex.org/W2125927592","https://openalex.org/W2153747431","https://openalex.org/W2171920515","https://openalex.org/W2260434259","https://openalex.org/W4255325693"],"related_works":["https://openalex.org/W2953105088","https://openalex.org/W3131491961","https://openalex.org/W2969720675","https://openalex.org/W1982158666","https://openalex.org/W2159224061","https://openalex.org/W2097945858","https://openalex.org/W1847856596","https://openalex.org/W1639969416","https://openalex.org/W2021087413","https://openalex.org/W2949495265"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,14,27,44,52,71,98,118,137],"the":[4,12,32,38,42,50,57,62,65,86,96,106,115,119,121,133,138,148,159,174],"Internet":[5,15,45],"and":[6,22,68,76,89,135,140,151,156,168,170,177],"highly":[7],"decentralized":[8],"network":[9],"services,":[10],"prompting":[11],"majority":[13],"users":[16],"continue":[17],"to":[18,131,146],"register":[19],"more":[20],"accounts,":[21],"cause":[23],"a":[24,79],"high":[25],"incidence":[26],"password":[28,46,81,149,161],"reuse,":[29],"which":[30,113],"makes":[31],"user":[33],"information":[34,87],"leakage":[35],"risks":[36],"facing":[37],"domino-style.":[39],"Based":[40],"on":[41,95],"data":[43],"leak":[47],"door":[48],"at":[49],"end":[51],"2011":[53],"as":[54,56],"well":[55],"college":[58],"students\u2019":[59],"online":[60],"survey,":[61],"paper":[63],"analyzed":[64],"structural":[66],"characteristics":[67],"reuse":[69,101],"behavior":[70],"netizen":[72],"passwords":[73],"in":[74,129],"detail,":[75],"thus":[77],"designed":[78,145],"multidimensional":[80],"scheme":[82,162],"that":[83],"infused":[84],"into":[85],"dimensions":[88],"classified":[90],"management.":[91],"This":[92],"scheme,":[93],"based":[94],"structure":[97],"\"seed":[99],"-":[100],"code\",":[102],"includes":[103],"three":[104],"dimensions:":[105],"content":[107],"dimension":[108,123,142],"contains":[109],"multi-independent":[110],"\"information":[111],"factor\",":[112],"constitutes":[114],"main":[116],"part":[117],"password;":[120,139],"formal":[122],"is":[124,143],"responsible":[125],"for":[126],"conversion":[127],"formatting,":[128],"order":[130],"enhance":[132],"complexity":[134],"security":[136],"space-time":[141],"targeted":[144],"protect":[147],"timeliness":[150],"reusability.":[152],"Through":[153],"comparative":[154],"analysis":[155],"quantitative":[157],"analysis,":[158],"new":[160],"not":[163],"only":[164],"has":[165],"good":[166],"memorability":[167],"convenience,":[169],"can":[171],"effectively":[172],"resist":[173],"violent":[175],"attacks":[176],"acquaintances":[178],"attacks.":[179]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
