Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Mónica Sara Santos
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
Weijun Hong
Dong Yang
Home
/
Author
/
SEONGHAN SHIN
Author Info
Open Visualization
Name
Affiliation
Papers
SEONGHAN SHIN
Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo, 153-8505 Japan
24
Collaborators
Citations
PageRank
24
57
10.15
Referers
Referees
References
123
196
179
Search Limit
100
196
Publications (24 rows)
Collaborators (24 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
An Extended Ctrt For Aes-256
0
0.34
2019
Strengthened Pake Protocols Secure Against Malicious Private Key Generator
0
0.34
2019
How To Preserve User Anonymity In Password-Based Anonymous Authentication Scheme
0
0.34
2018
Secure Hybrid Authentication Protocols against Malicious Key Generation Center
0
0.34
2018
Simple Anonymous Password-Based Authenticated Key Exchange (Sapake), Reconsidered
2
0.37
2017
Security Analysis of Password-Authenticated Key Retrieval.
1
0.35
2017
A security framework for MQTT.
0
0.34
2016
A secure anonymous password-based authentication protocol with control of authentication numbers
0
0.34
2016
On Finding Secure Domain Parameters Resistant To Cheon'S Algorithm
0
0.34
2015
Hidden Credential Retrieval, Revisited
0
0.34
2015
On Unlinkability Of Password-Based Anonymous Authentication
0
0.34
2015
In search of secure domain parameters under strong diffie-hellman and related assumptions
0
0.34
2014
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2
4
0.44
2012
Threshold Anonymous Password-Authenticated Key Exchange Secure Against Insider Attacks
2
0.40
2011
Security Analysis Of Two Augmented Password-Authenticated Key Exchange Protocols
1
0.35
2010
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication
0
0.34
2010
A New Security Architecture For Personal Networks And Its Performance Evaluation
0
0.34
2008
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
13
0.70
2006
A lower-bound of complexity for RSA-Based password-authenticated key exchange
3
0.43
2005
A simplified leakage-resilient authenticated key exchange protocol with optimal memory size
1
0.37
2005
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, And Applications
4
0.45
2005
Authenticated Key Exchange For Wireless Security
0
0.34
2005
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks
8
0.80
2005
Leakage-Resilient Authenticated Key Establishment Protocols
18
1.13
2003
1