<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-02T09:28:50Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/5527" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/5527</identifier>
        <datestamp>2021-12-13T01:10:35Z</datestamp>
        <setSpec>1582963413512:1596119372420</setSpec>
        <setSpec>user-ytu</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack</dc:title>
          <dc:creator>Khin Su Myat Moe</dc:creator>
          <dc:creator>Thanda Win</dc:creator>
          <dc:description>Abstract – Nowadays, security of password file is one of the most
important problems for millions of users and companies in
various fields. So, many systems store the password files in
database using the various hashing and salting algorithm.
However, password hashing is not secure by attackers because
they try to get user’s password in password file that are stored in
the database using various attacks such as brute force attack,
password guessing attack, etc. Therefore, some systems store the
passwords in the database with honeywords or fake passwords
using honeywords generation algorithm to prevent the attacks
from hackers. But the current existing system using honeywords
generation algorithm meets the two problems. The first problem
is typo safety problem and the last problem is storage overhead
problem. In this paper, we propose a novel honeyword
generation approach which decreases the storage overhead, typo
safety problem and also reduces the other drawbacks of existing
honeywords generation techniques such as old password
management problem, etc. Our proposed system stores the other
users’ passwords as honeywords in the database instead of
creating the honeywords for reducing storage overhead problem
and typo safety problem. Moreover, we store the password and
honeywords into the database using a unique hashing algorithm
with very low time complexity as most of the steps involved
simple binary operations.</dc:description>
          <dc:date>2017-10-17</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000005527</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/5527</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
