scispace - formally typeset
S

SeongHan Shin

Researcher at National Institute of Advanced Industrial Science and Technology

Publications -  60
Citations -  426

SeongHan Shin is an academic researcher from National Institute of Advanced Industrial Science and Technology. The author has contributed to research in topics: Password & Authenticated Key Exchange. The author has an hindex of 11, co-authored 56 publications receiving 401 citations. Previous affiliations of SeongHan Shin include University of Tokyo & Chuo University.

Papers
More filters
Proceedings ArticleDOI

A security framework for MQTT

TL;DR: This paper proposes a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol, which does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides.
Patent

Authentication system, and remotely distributed storage system

TL;DR: In this article, a master key generator is used to generate, based on an input password and a predetermined calculation, a value MK and further uses an authentication result judging part to calculate, from the value MK, values V1 and V2.
Book ChapterDOI

Leakage-Resilient Authenticated Key Establishment Protocols

TL;DR: In this paper, the authors review authenticated key establishment protocols from a different point of view, i.e., the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a client side and a server side.

Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2

TL;DR: This document describes an efficient augmented password-only authentication and key exchange protocol where a user remembers a low-entropy password and its verifier is registered in the intended server and it provides resistance to server compromise.
Journal ArticleDOI

LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links

TL;DR: This work proposes new handover procedures to be performed by mobile routers and by visiting mobile nodes based on leakage resilient-authenticated key establishment (LR-AKE) protocol, and evaluates the proposed handover procedure in terms of handover delay which affects the session continuity.