S
SeongHan Shin
Researcher at National Institute of Advanced Industrial Science and Technology
Publications - 60
Citations - 426
SeongHan Shin is an academic researcher from National Institute of Advanced Industrial Science and Technology. The author has contributed to research in topics: Password & Authenticated Key Exchange. The author has an hindex of 11, co-authored 56 publications receiving 401 citations. Previous affiliations of SeongHan Shin include University of Tokyo & Chuo University.
Papers
More filters
Proceedings ArticleDOI
A security framework for MQTT
TL;DR: This paper proposes a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol, which does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides.
Patent
Authentication system, and remotely distributed storage system
TL;DR: In this article, a master key generator is used to generate, based on an input password and a predetermined calculation, a value MK and further uses an authentication result judging part to calculate, from the value MK, values V1 and V2.
Book ChapterDOI
Leakage-Resilient Authenticated Key Establishment Protocols
TL;DR: In this paper, the authors review authenticated key establishment protocols from a different point of view, i.e., the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a client side and a server side.
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2
Kazukuni Kobara,SeongHan Shin +1 more
TL;DR: This document describes an efficient augmented password-only authentication and key exchange protocol where a user remembers a low-entropy password and its verifier is registered in the intended server and it provides resistance to server compromise.
Journal ArticleDOI
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
TL;DR: This work proposes new handover procedures to be performed by mobile routers and by visiting mobile nodes based on leakage resilient-authenticated key establishment (LR-AKE) protocol, and evaluates the proposed handover procedure in terms of handover delay which affects the session continuity.