{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:29:07Z","timestamp":1767140947133,"version":"build-2238731810"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T00:00:00Z","timestamp":1494547200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0886-4","type":"journal-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T08:37:19Z","timestamp":1494578239000},"page":"1161-1173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel secure and efficient hash function with extra padding against rainbow table attacks"],"prefix":"10.1007","volume":"21","author":[{"given":"Hyung-Jin","family":"Mun","sequence":"first","affiliation":[]},{"given":"Sunghyuck","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jungpil","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,12]]},"reference":[{"issue":"1","key":"886_CR1","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/s10586-015-0518-9","volume":"19","author":"K-H Han","year":"2016","unstructured":"Han, K.-H., Bae, W.-S.: Proposing and verifying a security protocol for hash function-based IoT communication system. Cluster Comput. 19(1), 497\u2013504 (2016)","journal-title":"Cluster Comput."},{"issue":"4","key":"886_CR2","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1007\/s10586-013-0259-6","volume":"16","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Zhang, Y., Chen, J., Li, H., Wang, Yumin: End-to-end security scheme for machine type communication based on generic authentication architecture. Cluster Comput. 16(4), 861\u2013871 (2013)","journal-title":"Cluster Comput."},{"issue":"4","key":"886_CR3","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1007\/s10586-013-0258-7","volume":"16","author":"B Qin","year":"2013","unstructured":"Qin, B., Wang, H., Qianhong, W., Liu, J., Domingo-Ferrer, J.: Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Comput. 16(4), 845\u2013859 (2013)","journal-title":"Cluster Comput."},{"issue":"1","key":"886_CR4","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s10586-015-0508-y","volume":"19","author":"Y-S Jeong","year":"2016","unstructured":"Jeong, Y.-S., Shin, S.-S., Han, K.-H.: High-dimentional data authentication protocol based on hash chain for Hadoop systems. Cluster Comput. 19(1), 475\u2013484 (2016)","journal-title":"Cluster Comput."},{"issue":"8","key":"886_CR5","doi-asserted-by":"crossref","first-page":"979","DOI":"10.5626\/JOK.2015.42.8.979","volume":"42","author":"H Jung","year":"2015","unstructured":"Jung, H., Shin, D., Cho, K., Nam, C.: BLE-OTP authorization mechanism for ibeacon network security. J. KIISE 42(8), 979\u2013989 (2015)","journal-title":"J. KIISE"},{"issue":"1","key":"886_CR6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.9708\/jksci.2015.20.1.119","volume":"20","author":"S Yong","year":"2015","unstructured":"Yong, S.: Password-based user authentication scheme using a dual-display method. J. Korea Soc. Comput. Inf. 20(1), 119\u2013125 (2015)","journal-title":"J. Korea Soc. Comput. Inf."},{"key":"886_CR7","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Kim, H.S.: HOTP-Based Key Agreement Protocol Over Home Network. In: FutureTech2012. Lecture Notes in Electrical Engineering, vol. 164, pp. 171\u2013179 (2012)","DOI":"10.1007\/978-94-007-4516-2_17"},{"key":"886_CR8","doi-asserted-by":"crossref","unstructured":"Mun, H.-J., Lee, K.M., Lee, S.-H. Person-wise privacy level access control for personal information directory services. In: Embedded and Ubiquitous Computing, Volume 4096 of the series Lecture Notes in Computer Science, pp. 89\u201398 (2006)","DOI":"10.1007\/11802167_11"},{"key":"886_CR9","unstructured":"Mun, H.J.: A role based personal sensitive information protection with subject policy. PhD Thesis of Computer Science Paper, Chungbuk University, Korea (2008)"},{"issue":"13","key":"886_CR10","first-page":"251","volume":"5","author":"H-J Mun","year":"2013","unstructured":"Mun, H.-J., Ju, Y., Yoo, J.: Multiple authentication system for privacy protection and efficient user authentication. Int. J. Adv. Comput. Technol. 5(13), 251\u2013256 (2013)","journal-title":"Int. J. Adv. Comput. Technol."},{"issue":"4","key":"886_CR11","first-page":"439","volume":"11\u2013C","author":"J Kwak","year":"2004","unstructured":"Kwak, J., Oh, S., Yang, H., Won, D.: An improved optimal strong-password authentication protocol secure against stolen-verifier attack and impersonation attack. KIPS Trans. C 11\u2013C(4), 439\u2013446 (2004)","journal-title":"KIPS Trans. C"},{"issue":"3","key":"886_CR12","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11416-016-0270-6","volume":"12","author":"HJ Mun","year":"2016","unstructured":"Mun, H.J., Han, K.H.: Blackhole attack: user identity and password seize attack using honeypot. J. Comput. Virol. Hacking Tech. 12(3), 185\u2013190 (2016). doi: 10.1007\/s11416-016-0270-6","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"4","key":"886_CR13","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I-En Liao","year":"2006","unstructured":"Liao, I-En, Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4), 727\u2013740 (2006)","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"886_CR14","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1145\/361082.361089","volume":"17","author":"GB Purdy","year":"1974","unstructured":"Purdy, G.B.: A high security log-in procedure. Commun. ACM 17(8), 442\u2013445 (1974)","journal-title":"Commun. ACM"},{"key":"886_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, H., Kumar, S., Joseph, R., Kumar, D. et al.: Rainbow table to crack password using MD5 hashing algorithm. In: IEEE Conference on Information & Communication Technologies (ICT), JeJu Island, pp. 433\u2013439 (2013)","DOI":"10.1109\/CICT.2013.6558135"},{"key":"886_CR16","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and communications security, Alexandria, VA. doi: 10.1145\/1102120.1102168 07\u201311 November (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"886_CR17","doi-asserted-by":"crossref","unstructured":"Papantonakis, P., Pnevmatikatos, D., Papaefstathiou, I. and Manifavas, C.: Fast, FPGA-based rainbow table creation for attacking encrypted mobile communications. In: The 23rd International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u20136 (2013)","DOI":"10.1109\/FPL.2013.6645525"},{"issue":"3","key":"886_CR18","doi-asserted-by":"crossref","first-page":"79","DOI":"10.7472\/jksii.2014.15.3.79","volume":"15","author":"HR Ryu","year":"2014","unstructured":"Ryu, H.R., Hong, M., Kwon, T.: Behavioural Analysis of Password Authentication and countermeasure to phishing attacks\u2014from user experience and HCI perspectives. J. Internet Comput. Serv. 15(3), 79\u201390 (2014)","journal-title":"J. Internet Comput. Serv."},{"issue":"5","key":"886_CR19","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/S0167-4048(00)05032-X","volume":"19","author":"M Peyravian","year":"2000","unstructured":"Peyravian, M., Zunic, N.: Methods for protecting password transmission. Comput. Secur. 19(5), 466\u2013469 (2000)","journal-title":"Comput. Secur."},{"issue":"8","key":"886_CR20","first-page":"795","volume":"24","author":"T Kwon","year":"1997","unstructured":"Kwon, T., Song, J.: An efficient password-based authentication protocol secure against guessing attacks. J. KISS A 24(8), 795\u2013806 (1997)","journal-title":"J. KISS A"},{"key":"886_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm. In: IETF Network Working Group, RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"886_CR22","first-page":"1","volume-title":"Advances in Cryptology\u2014Crypto\u201996, Lecture Notes in Computer Science","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) Advances in Cryptology\u2014Crypto\u201996, Lecture Notes in Computer Science, pp. 1\u201315. Springer, New York (1996)"},{"key":"886_CR23","unstructured":"MD5: https:\/\/ko.wikipedia.org\/wiki\/MD5"},{"key":"886_CR24","volume-title":"Cryptography and Network Security","author":"W Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice-Hall, New Jersey (2003)","edition":"3"},{"key":"886_CR25","unstructured":"Mun, H.J.: CBNU-IUCF, Apparatus And Method For Amending Password Length, Korea Patent 1015966280000, Korea (2016)"},{"key":"886_CR26","doi-asserted-by":"crossref","unstructured":"Tahir, R., Hu, H., Gu, D., McDonald-Maier, K., Howells., G.: Resilience against brute force and rainbow table attacks using strong ICMetrics session key pairs. 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1\u20136 (2013)","DOI":"10.1109\/ICCSPA.2013.6487307"},{"issue":"4","key":"886_CR27","doi-asserted-by":"publisher","first-page":"867","DOI":"10.6109\/jkiice.2014.18.4.867","volume":"18","author":"H Seo","year":"2014","unstructured":"Seo, H., Kim, H.: Two layered secure password generation with random number generator. JKIICE 18(4), 867\u2013875 (2014). doi: 10.6109\/jkiice.2014.18.4.867","journal-title":"JKIICE"},{"key":"886_CR28","unstructured":"Sprengers, M., Batina, L.: Speeding up GPU-based password cracking. In SHARCS2012, pp. 35\u201354, Washington DC, 17\u201318 March 2012. http:\/\/2012.sharcs.org\/record.pdf"},{"key":"886_CR29","unstructured":"Goodin, D.: 25-GPU cluster cracks every standard Windows password in 6 hours. http:\/\/arstechnica.com\/security\/2012\/12\/25-gpu-cluster-cracks-every-standard-windows-password-in-6-hours\/ (2012)"},{"key":"886_CR30","unstructured":"Kak, A.: The Dictionary Attack and the Rainbow-Table Attack on Password, Purdue University, West Lafayette, IN. https:\/\/engineering.purdue.edu\/kak\/compsec\/NewLectures\/Lecture24.pdf"},{"key":"886_CR31","unstructured":"HashKiller: https:\/\/hashkiller.co.uk\/"},{"issue":"1","key":"886_CR32","first-page":"90","volume":"18","author":"G Moon","year":"2012","unstructured":"Moon, G., Kim, J., Hong, M.: A graphical password scheme resistant to shoulder surfing attack in mobile environments. J. KIISE 18(1), 90\u201394 (2012)","journal-title":"J. KIISE"},{"issue":"4","key":"886_CR33","first-page":"903","volume":"26","author":"S Jung","year":"2016","unstructured":"Jung, S., Kwon, T.: Automated smudge attacks based on machine learning and security analysis of pattern lock systems. J. Korea Inst. Inf. Secu. Cryptol 26(4), 903\u2013910 (2016)","journal-title":"J. Korea Inst. Inf. Secu. Cryptol"},{"issue":"6","key":"886_CR34","doi-asserted-by":"publisher","first-page":"11","DOI":"10.14257\/AJMAHS.2016.06.03","volume":"6","author":"D-M Choi","year":"2016","unstructured":"Choi, D.-M.: Password authentication scheme resistant to smudge and shoulder surfing attack in mobile environments. Asia Pac. J. Multimedia Serv. Converg Art Humanit. Sociol. 6(6), 11\u201319 (2016). doi: 10.14257\/AJMAHS.2016.06.03","journal-title":"Asia Pac. J. Multimedia Serv. Converg Art Humanit. Sociol."}],"updated-by":[{"DOI":"10.1007\/s10586-017-0984-3","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0886-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0886-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0886-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T10:49:39Z","timestamp":1569322179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0886-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,12]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["886"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0886-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,12]]}}}