Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weon Shin is active.

Publication


Featured researches published by Weon Shin.


australasian conference on information security and privacy | 2001

An End-to-End Authentication Protocol in Wireless Application Protocol

Jong Phil Yang; Weon Shin; Kyung Hyune Rhee

Mobile commerce is becoming more and more commonplace, but security is still a major concern. To provide security, theWAP (Wireless Application Protocol) forum suggests theWAP security architecture. However, it needs theWAP gateway for intermediate process between the WTLS (Wireless Transport Layer Security) and the SSL (Secure Socket Layer) protocol, and it does not guarantee end-to-end security between the mobile devices and the WAP servers. In this paper, we propose a new authentication protocol to solve this problem. Our solution is based on the design of a new network component that is called CRL-agent. Furthermore, we also analyze and evaluate the security strength of the proposed protocol.


public key cryptography | 2000

All-or-Nothing Transform and Remotely Keyed Encription Protocols

Sang Uk Shin; Weon Shin; Kyung Hyune Rhee

We propose two new Remotely Keyed Encryption protocols; a length-increasing RKE and a length-preserving RKE. The proposed protocols have smaller computations than the existing schemes and provide sufficient security. In proposed protocols, we use the cryptographic transform with all-or-nothing properties proposed by Rivest as encryption operation in the host. By using all-or-nothing transform(AONT), RKE can be more dependent on the entire input and all encryption operation can be implemented only by using hash functions in the host. Moreover, we provide a length-preserving RKE protocol requires only one interaction between the host and the card.


The Journal of the Korean Institute of Information and Communication Engineering | 2015

A New Filtering System against the Disclosure of Sensitive Internal Information

Tae-kyung Ju; Weon Shin

Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.


The Kips Transactions:partb | 2002

A Forgery detection protocol for protection of mobile agent execution results

Hee-Yeon Kim; Jung-Hwa Shin; Weon Shin; Kyung-Hyune Rhee

Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.


The Journal of the Korean Institute of Information and Communication Engineering | 2010

A Secure Logging for Collection of Digital Evidences

Weon Shin


The Journal of the Korean Institute of Information and Communication Engineering | 2015

The Propagation Dynamics of Multiple Internet Worms

Weon Shin


The Journal of the Korean Institute of Information and Communication Engineering | 2013

Epidemics of Wireless Mobile Worms on Smartphones

Weon Shin


The Journal of the Korean Institute of Information and Communication Engineering | 2011

A New Defense against DDoS Attacks using Reputation

Jung-Hwa Shin; Weon Shin


The Journal of the Korean Institute of Information and Communication Engineering | 2010

A Software Watermarking for Java Programs

Weon Shin


The Journal of the Korean Institute of Information and Communication Engineering | 2008

A Study on the Spread of Internet Worms by Internet Environments

Weon Shin

Collaboration


Dive into the Weon Shin's collaboration.

Top Co-Authors

Avatar

Kyung Hyune Rhee

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Jung-Hwa Shin

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Chae Duk Jung

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Sang Uk Shin

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Won-Young Lee

Pukyong National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge