The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

SeongHan Shin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:269-284 [Conf]
  2. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:155-172 [Conf]
  3. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:191-205 [Conf]
  4. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:944-952 [Conf]
  5. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:443-458 [Conf]
  6. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:22-31 [Conf]
  7. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:767-777 [Conf]
  8. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:444-458 [Conf]
  9. SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai
    A New Security Architecture for Personal Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  10. Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. [Citation Graph (, )][DBLP]


  11. Partnership in key exchange protocols. [Citation Graph (, )][DBLP]


  12. A security framework for personal networks. [Citation Graph (, )][DBLP]


  13. A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. [Citation Graph (, )][DBLP]


  14. Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002