Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Seonghan Shin"'
Publikováno v:
Sensors, Vol 24, Iss 1, p 159 (2023)
5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authenti
Externí odkaz:
https://doaj.org/article/cca49ccbcba548958a633678f31221a2
Autor:
SeongHan SHIN
Publikováno v:
IEICE Transactions on Information and Systems. :1900-1910
Autor:
SeongHan SHIN, Shota YAMADA, Goichiro HANAOKA, Yusuke ISHIDA, Atsushi KUNII, Junichi OKETANI, Shimpei KUNII, Kiyoshi TOMOMURA
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1121-1133
Autor:
SeongHan Shin
Publikováno v:
Information Security Applications ISBN: 9783031256585
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dbd268e65213968324990d049c794a43
https://doi.org/10.1007/978-3-031-25659-2_9
https://doi.org/10.1007/978-3-031-25659-2_9
Autor:
SeongHan Shin
Publikováno v:
IEICE Transactions on Information and Systems. :1880-1893
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :150-164
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023. The 21 full papers presented were carefully reviewed and selected fr
Autor:
Ishida Yusuke, Junichi Oketani, Kunii Shimpei, SeongHan Shin, Goichiro Hanaoka, Shota Yamada, Kiyoshi Tomomura, Atsushi Kunii
Publikováno v:
Information Security Applications ISBN: 9783030393021
WISA
WISA
At CRYPTO 2000, Desai proposed a simple and faster AONT based on the CTR mode of encryption (called, CTRT) and proved its security in the ideal cipher model. Though AES-128 whose key length \(k=128\) and block length \(l=128\) can be used in CTRT as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d0bc29b7b5753867da20e3345a24477
https://doi.org/10.1007/978-3-030-39303-8_7
https://doi.org/10.1007/978-3-030-39303-8_7
Autor:
SeongHan Shin
Publikováno v:
Information Security Applications ISBN: 9783030393021
WISA
WISA
At WISA 2015, Choi et al. [9] proposed an identity-based password-authenticated key exchange (iPAKE) protocol using the Boneh-Franklin IBE scheme. In this paper, we revisit the iPAKE protocol [9] (and its generic construction) that has been standardi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::59ff3e26b86d27c29418af1404eaf031
https://doi.org/10.1007/978-3-030-39303-8_15
https://doi.org/10.1007/978-3-030-39303-8_15