{"id":"https://openalex.org/W4404047809","doi":"https://doi.org/10.1145/3703350","title":"The Effect of Domain Terms on Password Security","display_name":"The Effect of Domain Terms on Password Security","publication_year":2024,"publication_date":"2024-11-04","ids":{"openalex":"https://openalex.org/W4404047809","doi":"https://doi.org/10.1145/3703350"},"language":"en","primary_location":{"id":"doi:10.1145/3703350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3703350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3703350","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3703350","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104331792","display_name":"Yubing Bao","orcid":"https://orcid.org/0009-0007-6753-6415"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yubing Bao","raw_affiliation_strings":["Fudan University School of Computer Science, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080289201","display_name":"Jianping Zeng","orcid":"https://orcid.org/0000-0003-3686-1454"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]},{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping Zeng","raw_affiliation_strings":["Fudan University School of Computer Science, Shanghai, China and Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, Shanghai, China","Fudan University School of Computer Science, Shanghai China","Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, Shanghai China"],"affiliations":[{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai, China and Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, Shanghai, China","institution_ids":["https://openalex.org/I1302611135"]},{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, Shanghai China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111297139","display_name":"Jirui Yang","orcid":"https://orcid.org/0009-0005-1713-3437"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jirui Yang","raw_affiliation_strings":["Fudan University School of Computer Science, Shanghai, China","Fudan University School of Computer Science, Shanghai China"],"affiliations":[{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100954952","display_name":"Ruining Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruining Yang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China","Fudan University School of Computer Science, Shanghai China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047344828","display_name":"Zhihui Lu","orcid":"https://orcid.org/0000-0001-5706-7503"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihui Lu","raw_affiliation_strings":["Fudan University School of Computer Science, Shanghai, China","Fudan University School of Computer Science, Shanghai China"],"affiliations":[{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Fudan University School of Computer Science, Shanghai China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5104331792"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30459257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"1","first_page":"1","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.752888560295105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5556106567382812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47333580255508423},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.4459823966026306},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42812061309814453},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.33816099166870117},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13058599829673767}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.752888560295105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5556106567382812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47333580255508423},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.4459823966026306},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42812061309814453},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.33816099166870117},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13058599829673767},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3703350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3703350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3703350","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3703350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3703350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3703350","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.4000000059604645,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4404047809.pdf"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1526870393","https://openalex.org/W1603598191","https://openalex.org/W2007488200","https://openalex.org/W2030112111","https://openalex.org/W2056448619","https://openalex.org/W2066636486","https://openalex.org/W2080051698","https://openalex.org/W2086553822","https://openalex.org/W2100783932","https://openalex.org/W2104773223","https://openalex.org/W2135359429","https://openalex.org/W2149929743","https://openalex.org/W2165612380","https://openalex.org/W2168164069","https://openalex.org/W2171920515","https://openalex.org/W2346878720","https://openalex.org/W2394619600","https://openalex.org/W2524553946","https://openalex.org/W2528123348","https://openalex.org/W2534419286","https://openalex.org/W2616051826","https://openalex.org/W2680793898","https://openalex.org/W2734150319","https://openalex.org/W2795675112","https://openalex.org/W2801763503","https://openalex.org/W2891820333","https://openalex.org/W2895840273","https://openalex.org/W2914452207","https://openalex.org/W2914783728","https://openalex.org/W2940616832","https://openalex.org/W2949727111","https://openalex.org/W2963532563","https://openalex.org/W2982664727","https://openalex.org/W3016314916","https://openalex.org/W3035133096","https://openalex.org/W3080486240","https://openalex.org/W3090907849","https://openalex.org/W3120591290","https://openalex.org/W3154021468","https://openalex.org/W3155266060","https://openalex.org/W4212834454","https://openalex.org/W4239008634","https://openalex.org/W4247551517","https://openalex.org/W4249562827","https://openalex.org/W4249968242","https://openalex.org/W4309934776","https://openalex.org/W4315746341","https://openalex.org/W6788810363"],"related_works":["https://openalex.org/W2359085393","https://openalex.org/W2969720675","https://openalex.org/W2949495265","https://openalex.org/W85711018","https://openalex.org/W2021087413","https://openalex.org/W2163113603","https://openalex.org/W2105351390","https://openalex.org/W2400890210","https://openalex.org/W3088784215","https://openalex.org/W2237863779"],"abstract_inverted_index":{"The":[0,79,151],"predominant":[1],"authentication":[2],"method":[3],"still":[4],"relies":[5],"on":[6,47,53,129,148,203],"usernames":[7],"and":[8,137],"passwords.":[9,24,78],"To":[10,59],"enhance":[11],"memorability,":[12],"domain":[13,51,57,75,93,121,146,162,184,207],"terms":[14,52,76,147,163,185],"may":[15],"have":[16],"been":[17],"opted":[18],"to":[19,33,68,91,100,141,176],"include":[20],"as":[21],"part":[22],"of":[23,30,45,73,83,145,206,215,230],"However,":[25],"there":[26,41],"is":[27,42],"little":[28],"analysis":[29],"the":[31,61,70,97,130,138,143,166,171,188,193,204,227],"extent":[32],"which":[34],"such":[35],"practice":[36],"affects":[37],"password":[38,114,118,124,149,210],"security,":[39],"so":[40],"a":[43,65,111,222],"lack":[44],"guidance":[46,202],"how":[48],"users":[49],"use":[50],"websites":[54],"with":[55,120],"different":[56,213],"characteristics.":[58],"address":[60],"problem,":[62],"we":[63,87,105],"propose":[64,106],"novel":[66,223],"approach":[67],"analyze":[69],"security":[71,228],"effect":[72],"using":[74,132],"in":[77,165,187,209],"methodology":[80],"primarily":[81],"consists":[82],"three":[84],"stages.":[85],"First,":[86],"utilize":[88],"Web":[89],"crawlers":[90],"harvest":[92],"vocabularies,":[94],"subsequently":[95],"leveraging":[96],"TextRank":[98],"algorithm":[99,108],"rank":[101],"their":[102],"importance.":[103],"Second,":[104],"an":[107],"for":[109,156,180,212,225],"constructing":[110],"simulated":[112],"domain-specific":[113,181],"dataset":[115,131],"by":[116,174,196,233],"replacing":[117],"elements":[119],"terms.":[122],"Third,":[123],"guessing":[125],"experiments":[126],"are":[127],"done":[128],"PCFG":[133],"(Probabilistic":[134],"Context-Free":[135],"Grammar)":[136],"Markov":[139],"model":[140],"evaluate":[142],"impact":[144],"security.":[150],"experimental":[152],"results":[153],"indicate":[154],"that,":[155],"systems":[157],"without":[158],"clear":[159],"domain,":[160],"20%":[161,183],"replacement":[164,186],"test":[167],"set":[168,190],"can":[169,191],"reduce":[170],"cracking":[172,194],"rate":[173,195],"up":[175],"5.45%.":[177],"In":[178,217],"contrast,":[179],"systems,":[182],"training":[189],"increase":[192],"6.45%.":[197],"These":[198],"findings":[199],"provide":[200],"practical":[201],"application":[205],"knowledge":[208],"creation":[211],"types":[214],"systems.":[216],"summary,":[218],"this":[219],"study":[220],"offers":[221],"perspective":[224],"exploring":[226],"implications":[229],"passwords":[231],"influenced":[232],"specific":[234],"domains.":[235]},"counts_by_year":[],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
