{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:20:44Z","timestamp":1743099644423,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030190620"},{"type":"electronic","value":"9783030190637"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19063-7_62","type":"book-chapter","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:20:03Z","timestamp":1558563603000},"page":"769-777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Defense Dictionary Attack with Message Digest Using Image Salt"],"prefix":"10.1007","author":[{"given":"Sun-young","family":"Park","sequence":"first","affiliation":[]},{"given":"Keecheon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,23]]},"reference":[{"unstructured":"NIST: Secure Hash Standard (SHS) FIPS PUB 180-4 (2015)","key":"62_CR1"},{"unstructured":"HL7: HL7 FHIR v3 Code System IntegrityCheckAlgorithm (2016)","key":"62_CR2"},{"key":"62_CR3","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Philippe Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D., (eds.) Advances in Cryptology - CRYPTO 2003. CRYPTO 2003. LNCS, vol. 2729. Springer, Heidelberg (2003)"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"Xiaoyun Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V., (eds.) Advances in Cryptology\u2013LNCS, vol. 3621. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Brunton, F., Nissenbaum, H.: Obfuscation: A User\u2019s Guide for Privacy and Protest. The MIT Press (2015)","key":"62_CR5","DOI":"10.7551\/mitpress\/9780262029735.001.0001"},{"doi-asserted-by":"crossref","unstructured":"Ganter, V., Strube, M.: Finding hedges by chasing weasels: hedge detection using Wikipedia tags and shallow linguistic features. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers (ACLShort 2009), Association for Computational Linguistics, Stroudsburg, PA, USA, pp. 173\u2013176 (2009)","key":"62_CR6","DOI":"10.3115\/1667583.1667636"},{"unstructured":"IHE: IHE IT Infrastructure Technical Framework Supplement Document Digital Signature (DSG) (2015)","key":"62_CR7"},{"unstructured":"Ahmed, H.A., Jang, J.W.: Document certificate authentication system using digitally signed QR code tag. In: IMCOM 2018 (2018). Article No. 65","key":"62_CR8"},{"doi-asserted-by":"crossref","unstructured":"Ren, W., Sun, Y.: A hash-based distributed storage strategy of flowtables in SDN-IoT networks. In: GLOBECOM (2017)","key":"62_CR9","DOI":"10.1109\/GLOCOM.2017.8254507"},{"unstructured":"Wang, C., Zheng, W.: Identity-based fast authentication scheme for smart mobile devices in body area networks. Wirel. Commun. Mob. Comput. 2018, 7 (2018). Hindawi","key":"62_CR10"},{"doi-asserted-by":"crossref","unstructured":"Noh, H.K., Choi, C.K., Park, M.S., Kim, S.J.: Korea Information Processing Society, vol. 3, no. 12, pp. 463\u2013478 (2014)","key":"62_CR11","DOI":"10.3745\/KTCCS.2014.3.12.463"},{"issue":"1","key":"62_CR12","first-page":"113","volume":"19","author":"JH Kim","year":"2009","unstructured":"Kim, J.H., Maeng, Y.J., Nyang, D.H., Lee, K.H.: Cognitive approach to anti-phishing and anti-pharming. J. Korea Inst. Inf. Secur. Cryptol. 19(1), 113\u2013124 (2009)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"unstructured":"Ryong, C.D., Yhdatabase CO., LTD.: Personalization Image providing Method for Preventing Phisiing and Pharming and Image Providing System for Same, 101363336 B1 (2014)","key":"62_CR13"},{"doi-asserted-by":"crossref","unstructured":"Park, S., Kim, K.: A study on the processing and reinforcement of message digest through two-dimensional array masking. In: International Conference on Information Networking (ICOIN) (2018)","key":"62_CR14","DOI":"10.1109\/ICOIN.2018.8343177"},{"unstructured":"Tau Ceti Co-operative Ltd.: The Legion of the Bouncy Castle Home Page. https:\/\/www.bouncycastle.org . Accessed 20 Oct 2018","key":"62_CR15"},{"unstructured":"Oelke, M.: Hash Toolkit. http:\/\/hashtoolkit.com . Accessed 20 Oct 2018","key":"62_CR16"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19063-7_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T12:49:33Z","timestamp":1663505373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19063-7_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030190620","9783030190637"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19063-7_62","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Information Management and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imcom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/imcom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}