Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Designing secure PUF-based authentication protocols for constrained environments

    Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of ...

    Sang-Woong Lee, Masoumeh Safkhani, Quynh Le, Omed Hassan Ahmed in Scientific Reports (2023)

  2. No Access

    Article

    ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

    Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications which have a crucial role in the current healthcare systems....

    Javad Alizadeh, Masoumeh Safkhani, Amir Allahdadi in Wireless Personal Communications (2022)

  3. No Access

    Article

    \(TBGODP^+\) : improvement of TBGODP, a time bound group ownership delegation protocol

    One of the challenging issues in RFID systems is the issue of group ownership transfer and ownership duration. To answer this need recently one protocol which combines group ownership transfer and time bound d...

    Farokhlagha Moazami, Masoumeh Safkhani in Journal of Ambient Intelligence and Humani… (2022)

  4. No Access

    Article

    An authentication and key agreement scheme for smart grid

    The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which develo** Internet of Energy (IoE) in the energy sector is a necessity also. Several schemes have been propose...

    Masoumeh Safkhani, Saru Kumari in Peer-to-Peer Networking and Applications (2022)

  5. No Access

    Article

    A New Searchable Encryption Scheme with Integrity Preservation Property

    Searchable encryption schemes allow documents’ owners to store their encrypted documents on servers, search for the desired keyword and then download only the desired encrypted file and then decrypt. Storing f...

    Mohammad Zamani, Masoumeh Safkhani, Negin Daneshpour in Wireless Personal Communications (2021)

  6. No Access

    Article

    SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption

    In systems equipped with radio frequency identification (RFID) technology, several security concerns may arise when the ownership of a tag should be transferred from one owner to another, e.g. the confidential...

    Farokhlagha Moazami, Masoumeh Safkhani in Wireless Networks (2020)

  7. No Access

    Article

    A New Lightweight User Authentication and Key Agreement Scheme for WSN

    The Internet of Things (IoT) is one of the most up-to-date and newest technologies that allows remote control of heterogeneous networks and has a good outlook for industrial applications. Wireless sensor netwo...

    Foroozan Ghosairi Darbandeh, Masoumeh Safkhani in Wireless Personal Communications (2020)

  8. No Access

    Article

    Implementation of secret disclosure attack against two IoT lightweight authentication protocols

    Recently, security of the Internet of things on mobile phones, especially the fifth generation (5G), has attracted much attention. In this regard, state-of-the-art authentication protocols have been proposed w...

    Masoumeh Safkhani, Mahyar Shariat in The Journal of Supercomputing (2018)

  9. No Access

    Article

    An improved low-cost yoking proof protocol based on Kazahaya’s flaws

    Peris-Lopez et al. (J Netw Comput Appl 34:833–845, 2011) recently provided some guidelines that should be followed to design a secure yoking proof protocol. In addition, conforming to those guidelines and EPC C1-...

    Nasour Bagheri, Masoumeh Safkhani in The Journal of Supercomputing (2018)

  10. No Access

    Article

    Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things

    Internet of Things (IoT) is a technology in which for any object the ability to send data via communications networks is provided. Ensuring the security of Internet services and applications is an important fa...

    Masoumeh Safkhani, Nasour Bagheri in The Journal of Supercomputing (2017)

  11. No Access

    Article

    On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG

    Recently, Wang et al. analyzed the security of two EPC C1–G2 compliant RFID authentication protocols, called RAPLT and $$\textit{SRP}^...

    Masoumeh Safkhani, Mehdi Hosseinzadeh in Wireless Personal Communications (2017)

  12. No Access

    Chapter and Conference Paper

    Security Analysis of Niu et al. Authentication and Ownership Management Protocol

    Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authentication an...

    Masoumeh Safkhani, Hoda Jannati in Radio Frequency Identification and IoT Sec… (2017)

  13. No Access

    Article

    Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol

    EPC class 1 Generation-2 (or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol is known to be insecure. To improve the security of this stand...

    Nasour Bagheri, Masoumeh Safkhani, Majid Naderi in Neural Computing and Applications (2014)

  14. No Access

    Article

    Strengthening the Security of EPC C-1 G-2 RFID Standard

    In this paper, we analyze the security of AZUMI protocol which is compliant with EPC-Class-1 Generation-2 standard and recently has been proposed by Peris et al. This protocol is an improvement to a protocol p...

    Masoumeh Safkhani, Nasour Bagheri, Majid Naderi in Wireless Personal Communications (2013)

  15. No Access

    Chapter and Conference Paper

    Desynchronization and Traceability Attacks on RIPTA-DA Protocol

    Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified th...

    Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani in Radio Frequency Identification (2013)

  16. No Access

    Chapter and Conference Paper

    On the Security of Two RFID Mutual Authentication Protocols

    In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show th...

    Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram in Radio Frequency Identification (2013)

  17. No Access

    Chapter and Conference Paper

    On the Security of Tan et al. Serverless RFID Authentication and Search Protocols

    In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More p...

    Masoumeh Safkhani, Pedro Peris-Lopez in Radio Frequency Identification. Security a… (2013)

  18. No Access

    Article

    On the Designing of a Tamper Resistant Prescription RFID Access Control System

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protoco...

    Masoumeh Safkhani, Nasour Bagheri, Majid Naderi in Journal of Medical Systems (2012)

  19. Chapter and Conference Paper

    Another Fallen Hash-Based RFID Authentication Protocol

    In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret informati...

    Julio Cesar Hernandez-Castro in Information Security Theory and Practice. … (2012)

  20. No Access

    Chapter and Conference Paper

    On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol

    Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID systems. In this paper, we consider the security of a rece...

    Masoumeh Safkhani, Nasour Bagheri in Data Privacy Management and Autonomous Spo… (2012)

previous disabled Page of 2