{"id":"https://openalex.org/W2087323497","doi":"https://doi.org/10.1109/iihmsp.2007.4457542","title":"Framework for Windows Password Function Security Enhancement","display_name":"Framework for Windows Password Function Security Enhancement","publication_year":2007,"publication_date":"2007-11-01","ids":{"openalex":"https://openalex.org/W2087323497","doi":"https://doi.org/10.1109/iihmsp.2007.4457542","mag":"2087323497"},"language":"en","primary_location":{"id":"doi:10.1109/iihmsp.2007.4457542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100361421","display_name":"Li Li","orcid":"https://orcid.org/0009-0000-0437-6193"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Li","raw_affiliation_strings":["Shenzhen Graduate School, Harbin Institute of Technology, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Graduate School, Harbin Institute of Technology, Guangdong, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090260063","display_name":"Jing Wu","orcid":"https://orcid.org/0000-0003-2359-7084"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Wu","raw_affiliation_strings":["Harbin Institute of Technology, Harbin, Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075561239","display_name":"Xiaowei Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Wei Guo","raw_affiliation_strings":["Shenzhen Graduate School, Harbin Institute of Technology, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Graduate School, Harbin Institute of Technology, Guangdong, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100457571","display_name":"Meng Li","orcid":"https://orcid.org/0000-0003-3553-0813"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Li","raw_affiliation_strings":["Harbin Institute of Technology, Harbin, Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100850952","display_name":"Xiamu Niu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xia-Mu Niu","raw_affiliation_strings":["Harbin Institute of Technology, Harbin, Heilongjiang, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100361421"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11919507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"269","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8151898384094238},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8041857481002808},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6435719728469849},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5205310583114624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5135338306427002},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.4444955289363861},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4236333668231964},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10042285919189453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8151898384094238},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8041857481002808},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6435719728469849},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5205310583114624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5135338306427002},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.4444955289363861},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4236333668231964},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10042285919189453}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iihmsp.2007.4457542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1499649359","https://openalex.org/W2018770611","https://openalex.org/W2341614611","https://openalex.org/W6629744045"],"related_works":["https://openalex.org/W4285327239","https://openalex.org/W812360551","https://openalex.org/W4378418693","https://openalex.org/W1607245420","https://openalex.org/W2937484179","https://openalex.org/W4256444941","https://openalex.org/W25917909","https://openalex.org/W2504308523","https://openalex.org/W4239548142","https://openalex.org/W618686436"],"abstract_inverted_index":{"The":[0,97],"wide":[1],"application":[2],"of":[3,15,30,46,56,65,77,88,106],"Windows":[4,78,84],"operation":[5,79,124],"system":[6,80,143],"people":[7],"is":[8,34,125],"bringing":[9],"higher":[10],"request":[11],"for":[12,72,103,148],"the":[13,16,22,28,31,43,47,52,63,83,110,114,122,128,133,142],"security":[14,37,75],"system.":[17],"Identification":[18],"and":[19,54,90,94,109,137,146],"authorization":[20],"are":[21],"most":[23],"basic":[24],"means":[25],"to":[26],"protect":[27],"resources":[29],"computer,":[32],"which":[33,140],"improved":[35],"in":[36,39,113],"level":[38],"this":[40],"paper":[41],"on":[42],"logon":[44,59,85,107,134],"model":[45],"Windows.":[48],"We":[49],"first":[50],"discuss":[51],"advantages":[53],"disadvantages":[55],"several":[57],"existing":[58],"mechanisms.":[60],"To":[61],"overcome":[62],"weakness":[64],"these":[66],"models,":[67,108],"we":[68,131],"propose":[69],"a":[70],"framework":[71,98,129],"password":[73,95,111],"function":[74],"enhancement":[76],"via":[81],"investigating":[82],"authentication":[86,92],"consisting":[87],"Winlogon":[89],"GINA,":[91],"package":[93],"filter.":[96],"can":[99,117],"provide":[100],"flexible":[101,145],"interfaces":[102],"various":[104],"types":[105],"stored":[112],"SAM":[115],"database":[116],"be":[118],"changed":[119],"automatically":[120],"while":[121],"access":[123],"authenticated.":[126],"In":[127],"design,":[130],"separate":[132],"credential":[135],"collection":[136],"validation":[138],"module,":[139],"makes":[141],"more":[144],"convenient":[147],"redevelopment.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
