A security framework for MQTT SH Shin, K Kobara, CC Chuang, W Huang 2016 IEEE Conference on Communications and Network Security (CNS), 432-436, 2016 | 76 | 2016 |
Authentication system and remotely-distributed storage system H Imai, K Kobara, S Shin US Patent 7,895,436, 2011 | 52 | 2011 |
Efficient augmented password-only authentication and key exchange for IKEv2 S Shin, K Kobara | 45 | 2012 |
LR-AKE-based AAA for network mobility (NEMO) over wireless links H Fathi, S Shin, K Kobara, SS Chakraborty, H Imai, R Prasad IEEE Journal on Selected Areas in Communications 24 (9), 1725-1737, 2006 | 42 | 2006 |
Leakage-resilient authenticated key establishment protocols SH Shin, K Kobara, H Imai International Conference on the Theory and Application of Cryptology and …, 2003 | 33 | 2003 |
Towards secure cloud storage SH Shin, K Kobara Demo for CloudCom2010 2, 2010 | 29 | 2010 |
A secure threshold anonymous password-authenticated key exchange protocol SH Shin, K Kobara, H Imai International Workshop on Security, 444-458, 2007 | 27 | 2007 |
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks H Fathi, SH Shin, K Kobara, SS Chakraborty, H Imai, R Prasad IEEE journal on selected areas in communications 23 (11), 2182-2193, 2005 | 24 | 2005 |
A simple leakage-resilient authenticated key establishment protocol, its extensions, and applications SH Shin, K Kobara, H Imai IEICE transactions on fundamentals of electronics, communications and …, 2005 | 20 | 2005 |
Efficient and leakage-resilient authenticated key transport protocol based on RSA SH Shin, K Kobara, H Imai Applied Cryptography and Network Security: Third International Conference …, 2005 | 19 | 2005 |
Anonymous password-authenticated key exchange: New construction and its extensions SH Shin, K Kobara, H Imai IEICE transactions on fundamentals of electronics, communications and …, 2010 | 18 | 2010 |
A secure construction for threshold anonymous password-authenticated key exchange SH Shin, K Kobara, H Imai IEICE transactions on fundamentals of electronics, communications and …, 2008 | 18 | 2008 |
An efficient and leakage-resilient RSA-based authenticated key exchange protocol with tight security reduction SH Shin, K Kobara, H Imai IEICE transactions on fundamentals of electronics, communications and …, 2007 | 17 | 2007 |
Security proof of AugPAKE SH Shin, K Kobara, H Imai Cryptology ePrint Archive, 2010 | 16 | 2010 |
Very-efficient anonymous password-authenticated key exchange and its extensions SH Shin, K Kobara, H Imai International symposium on applied algebra, algebraic algorithms, and error …, 2009 | 16 | 2009 |
Security analysis of password-authenticated key retrieval SH Shin, K Kobara IEEE Transactions on dependable and secure computing 14 (5), 573-576, 2015 | 14 | 2015 |
Password authentication method S Shin, K Kobara US Patent 8,422,670, 2013 | 13 | 2013 |
A secure public cloud storage system SH Shin, K Kobara, H Imai 2011 International Conference for Internet Technology and Secured …, 2011 | 12 | 2011 |
Protocols for purpose-restricted anonymous communications in IP-based wireless networks H Fathi, SH Shin, K Kobara, H Imai Computer communications 31 (15), 3662-3671, 2008 | 10 | 2008 |
Partnership in key exchange protocols K Kobara, SH Shin, M Strefler Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 9 | 2009 |