Weon Shin
Pukyong National University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Weon Shin.
australasian conference on information security and privacy | 2001
Jong Phil Yang; Weon Shin; Kyung Hyune Rhee
Mobile commerce is becoming more and more commonplace, but security is still a major concern. To provide security, theWAP (Wireless Application Protocol) forum suggests theWAP security architecture. However, it needs theWAP gateway for intermediate process between the WTLS (Wireless Transport Layer Security) and the SSL (Secure Socket Layer) protocol, and it does not guarantee end-to-end security between the mobile devices and the WAP servers. In this paper, we propose a new authentication protocol to solve this problem. Our solution is based on the design of a new network component that is called CRL-agent. Furthermore, we also analyze and evaluate the security strength of the proposed protocol.
public key cryptography | 2000
Sang Uk Shin; Weon Shin; Kyung Hyune Rhee
We propose two new Remotely Keyed Encryption protocols; a length-increasing RKE and a length-preserving RKE. The proposed protocols have smaller computations than the existing schemes and provide sufficient security. In proposed protocols, we use the cryptographic transform with all-or-nothing properties proposed by Rivest as encryption operation in the host. By using all-or-nothing transform(AONT), RKE can be more dependent on the entire input and all encryption operation can be implemented only by using hash functions in the host. Moreover, we provide a length-preserving RKE protocol requires only one interaction between the host and the card.
The Journal of the Korean Institute of Information and Communication Engineering | 2015
Tae-kyung Ju; Weon Shin
Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.
The Kips Transactions:partb | 2002
Hee-Yeon Kim; Jung-Hwa Shin; Weon Shin; Kyung-Hyune Rhee
Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.
The Journal of the Korean Institute of Information and Communication Engineering | 2010
Weon Shin
The Journal of the Korean Institute of Information and Communication Engineering | 2015
Weon Shin
The Journal of the Korean Institute of Information and Communication Engineering | 2013
Weon Shin
The Journal of the Korean Institute of Information and Communication Engineering | 2011
Jung-Hwa Shin; Weon Shin
The Journal of the Korean Institute of Information and Communication Engineering | 2010
Weon Shin
The Journal of the Korean Institute of Information and Communication Engineering | 2008
Weon Shin