Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures | IEEE Conference Publication | IEEE Xplore