5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
You, Ilsun, Kim, Gunwoo, Shin, Seonghan, Kwon, Hoseok, Kim, Jongkil, Baek, Joonsang
Published in Sensors (Basel, Switzerland) (27.12.2023)
Published in Sensors (Basel, Switzerland) (27.12.2023)
Get full text
Journal Article
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin, Kobara, Kazukuni
Published in IEEE transactions on dependable and secure computing (01.09.2017)
Published in IEEE transactions on dependable and secure computing (01.09.2017)
Get full text
Journal Article
How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
SHIN, SeongHan, KOBARA, Kazukuni
Published in IEICE Transactions on Information and Systems (01.01.2018)
Published in IEICE Transactions on Information and Systems (01.01.2018)
Get full text
Journal Article
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Fathi, H., SeongHan Shin, Kobara, K., Chakraborty, S.S., Imai, H., Prasad, R.
Published in IEEE journal on selected areas in communications (01.09.2006)
Published in IEEE journal on selected areas in communications (01.09.2006)
Get full text
Journal Article
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks
Fathi, H., SeongHan Shin, Kobara, K., Chakraborty, S.S., Imai, H., Prasad, R.
Published in IEEE journal on selected areas in communications (01.11.2005)
Published in IEEE journal on selected areas in communications (01.11.2005)
Get full text
Journal Article
Two-Factor Authentication LRP-AKE, Revisited
Shin, Seonghan
Published in 2018 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2018)
Published in 2018 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2018)
Get full text
Conference Proceeding
A security framework for MQTT
SeongHan Shin, Kobara, Kazukuni, Chia-Chuan Chuang, Weicheng Huang
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01.10.2016)
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01.10.2016)
Get full text
Conference Proceeding
RSA-Based Password-Authenticated Key Exchange, Revisited
SHIN, SeongHan, KOBARA, Kazukuni, IMAI, Hideki
Published in IEICE Transactions on Information and Systems (2008)
Published in IEICE Transactions on Information and Systems (2008)
Get full text
Journal Article
Key Establishment Using Physically Unclonable Functions
Seonghan Shin, Kobara, Kazukuni
Published in 2015 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2015)
Published in 2015 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2015)
Get full text
Conference Proceeding
RSA-based Password-Authenticated Key Retrieval using multiple servers
SeongHan Shin, Kobara, Kazukuni
Published in World Congress on Internet Security (WorldCIS-2013) (01.12.2013)
Published in World Congress on Internet Security (WorldCIS-2013) (01.12.2013)
Get full text
Conference Proceeding
Protocols for Authenticated Anonymous Communications
Fathi, H., SeongHan Shin, Kobara, K., Imai, H.
Published in 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (01.09.2007)
Published in 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (01.09.2007)
Get full text
Conference Proceeding
A security framework for personal networks
SeongHan Shin, Kobara, K., Imai, H.
Published in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08) (01.01.2008)
Published in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08) (01.01.2008)
Get full text
Conference Proceeding
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security
SeongHan Shin, Kobara, K., Imai, H.
Published in 2006 International Conference on Computational Intelligence and Security (01.11.2006)
Published in 2006 International Conference on Computational Intelligence and Security (01.11.2006)
Get full text
Conference Proceeding
A Secure MQTT Framework from PUF-based Key Establishment
Shin, SeongHan, Kobara, Kazukuni
Published in 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2017)
Published in 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2017)
Get full text
Conference Proceeding