Skip to main content

and
  1. No Access

    Article

    Implementation of secret disclosure attack against two IoT lightweight authentication protocols

    Recently, security of the Internet of things on mobile phones, especially the fifth generation (5G), has attracted much attention. In this regard, state-of-the-art authentication protocols have been proposed w...

    Masoumeh Safkhani, Mahyar Shariat in The Journal of Supercomputing (2018)

  2. No Access

    Article

    An improved low-cost yoking proof protocol based on Kazahaya’s flaws

    Peris-Lopez et al. (J Netw Comput Appl 34:833–845, 2011) recently provided some guidelines that should be followed to design a secure yoking proof protocol. In addition, conforming to those guidelines and EPC C1-...

    Nasour Bagheri, Masoumeh Safkhani in The Journal of Supercomputing (2018)

  3. No Access

    Article

    Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things

    Internet of Things (IoT) is a technology in which for any object the ability to send data via communications networks is provided. Ensuring the security of Internet services and applications is an important fa...

    Masoumeh Safkhani, Nasour Bagheri in The Journal of Supercomputing (2017)