{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:03:27Z","timestamp":1757541807304,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225503","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:38Z","timestamp":1602792038000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt"],"prefix":"10.1109","author":[{"given":"Urvesh","family":"Rathod","sequence":"first","affiliation":[]},{"given":"Meghna","family":"Sonkar","sequence":"additional","affiliation":[]},{"given":"B. R.","family":"Chandavarkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2019.128018"},{"journal-title":"Formalization of security requirements and attack models for cryptographic hash functions in proverif","year":"2019","author":"yoshimura","key":"ref11"},{"key":"ref12","article-title":"Adding salt to hashing: A better way to store passwords","volume":"18","author":"ali","year":"2020","journal-title":"TELKOMNIKA Telecommunication Computing Electronics and Control"},{"journal-title":"Enhancing salted password hashing technique using swapping elements in an array algorithm","year":"2018","author":"karrar","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.07.04"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359225"},{"key":"ref16","first-page":"1","article-title":"Dynamic salt generation and placement for secure password storing","author":"boonkrong","year":"2016","journal-title":"IAENG International Journal of Computer Science 43 1 IJCS43104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2017.7885811"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2920538"},{"journal-title":"Salted password hashing - doing it right","year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1504\/IJITST.2018.095944","article-title":"Anti-continuous collisions user-based unpredictable iterative password salted hash encryption","volume":"8","author":"ali","year":"2018","journal-title":"Int J Internet Technology and Secured Transactions"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SysCoBIoTS48768.2019.9028012"},{"key":"ref8","first-page":"189","article-title":"Implementation of enhanced secure hash algorithm towards a secured web portal","author":"ali","year":"0","journal-title":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS) Singapore"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1504\/IJMC.2017.083459","article-title":"Users' intentions on the mobile securities trading system","volume":"15","author":"lee","year":"2017","journal-title":"Int J Mobile Communications"},{"key":"ref2","first-page":"713","volume":"100","author":"alawida","year":"2020","journal-title":"Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCOMS.2019.8821763"},{"journal-title":"Fast parallel keyed hash functions based on chaotic maps (pkhc)","year":"2011","author":"maqableh","key":"ref9"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2020,7,1]]},"location":"Kharagpur, India","end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225503.pdf?arnumber=9225503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:13:28Z","timestamp":1656375208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225503","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}