default search action
Masoumeh Safkhani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Mehdi Hosseinzadeh, Mohammad Reza Servati, Amir Masoud Rahmani, Masoumeh Safkhani, Jan Lansky, Renata Janoscova, Omed Hassan Ahmed, Jawad Tanveer, Sang-Woong Lee:
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems. IEEE Access 12: 61610-61628 (2024) - [j50]Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Samad Rostampour:
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. Future Internet 16(1): 9 (2024) - [j49]Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani:
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS. ISC Int. J. Inf. Secur. 16(2): 115-136 (2024) - [j48]Ygal Bendavid, Samad Rostampour, Yacine Berrabah, Nasour Bagheri, Masoumeh Safkhani:
The Rise of Passive RFID RTLS Solutions in Industry 5.0. Sensors 24(5): 1711 (2024) - 2023
- [j47]Foroozan Ghosairi Darbandeh, Masoumeh Safkhani:
SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks. Comput. Networks 220: 109469 (2023) - [j46]Fatemeh Pirmoradian, Masoumeh Safkhani, Seyed Mohammad Dakhilalian:
ECCPWS: An ECC-based protocol for WBAN systems. Comput. Networks 224: 109598 (2023) - [j45]Mohammad Reza Servati, Masoumeh Safkhani:
ECCbAS: An ECC based authentication scheme for healthcare IoT systems. Pervasive Mob. Comput. 90: 101753 (2023) - [j44]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States. Sensors 23(2): 937 (2023) - [j43]S. Zehtabchi, Negin Daneshpour, Masoumeh Safkhani:
A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol. Wirel. Networks 29(3): 1197-1212 (2023) - 2022
- [j42]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECGsound for human identification. Biomed. Signal Process. Control. 72(Part): 103335 (2022) - [j41]Samad Rostampour, Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Saru Kumari, Joel J. P. C. Rodrigues:
An Authentication Protocol for Next Generation of Constrained IoT Systems. IEEE Internet Things J. 9(21): 21493-21504 (2022) - [j40]Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Sadegh Sadeghi, Nasour Bagheri:
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols. J. Inf. Secur. Appl. 67: 103194 (2022) - [j39]Farokhlagha Moazami, Masoumeh Safkhani:
TBGODP+: improvement of TBGODP, a time bound group ownership delegation protocol. J. Ambient Intell. Humaniz. Comput. 13(6): 3283-3302 (2022) - [j38]Masoumeh Safkhani, Saru Kumari, Mohammad Shojafar, Sachin Kumar:
An authentication and key agreement scheme for smart grid. Peer-to-Peer Netw. Appl. 15(3): 1595-1616 (2022) - [j37]Javad Alizadeh, Masoumeh Safkhani, Amir Allahdadi:
ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN. Wirel. Pers. Commun. 126(4): 2911-2935 (2022) - 2021
- [j36]Amir Masoud Rahmani, Mokhtar Mohammadi, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Saru Kumari, Sarkhel H. Taher Karim, Mehdi Hosseinzadeh:
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET. IEEE Access 9: 88256-88271 (2021) - [j35]Amir Masoud Rahmani, Mokhtar Mohammadi, Shima Rashidi, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Saru Kumari, Mehdi Hosseinzadeh:
Questioning the Security of Three Recent Authentication and Key Agreement Protocols. IEEE Access 9: 98204-98217 (2021) - [j34]Fahimeh Nikkhah, Masoumeh Safkhani:
LAPCHS: A lightweight authentication protocol for cloud-based health-care systems. Comput. Networks 187: 107833 (2021) - [j33]Masoumeh Safkhani, Carmen Camara, Pedro Peris-Lopez, Nasour Bagheri:
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Veh. Commun. 28: 100311 (2021) - [j32]Mohammad Zamani, Masoumeh Safkhani, Negin Daneshpour, Amir Abbasian:
A New Searchable Encryption Scheme with Integrity Preservation Property. Wirel. Pers. Commun. 116(4): 3119-3142 (2021) - 2020
- [j31]Mehdi Hosseinzadeh, Jan Lansky, Amir Masoud Rahmani, Cuong Trinh, Masoumeh Safkhani, Nasour Bagheri, Bao Huynh:
A New Strong Adversary Model for RFID Authentication Protocols. IEEE Access 8: 125029-125045 (2020) - [j30]Cuong Trinh, Bao Huynh, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Mehdi Hosseinzadeh:
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments. IEEE Access 8: 165536-165550 (2020) - [j29]Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Hamidreza Tavakoli, Sachin Kumar, Jiahui Chen:
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications. IEEE Access 8: 200851-200862 (2020) - [j28]Amir Abbasian, Masoumeh Safkhani:
CNCAA: A new anti-collision algorithm using both collided and non-collided parts of information. Comput. Networks 172: 107159 (2020) - [j27]Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Nasour Bagheri:
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Networks 181: 107558 (2020) - [j26]Samad Rostampour, Masoumeh Safkhani, Ygal Bendavid, Nasour Bagheri:
ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob. Comput. 67: 101194 (2020) - [j25]Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. Secur. Commun. Networks 2020: 8836214:1-8836214:16 (2020) - [j24]Farokhlagha Moazami, Masoumeh Safkhani:
SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption. Wirel. Networks 26(7): 5285-5306 (2020) - [j23]Foroozan Ghosairi Darbandeh, Masoumeh Safkhani:
A New Lightweight User Authentication and Key Agreement Scheme for WSN. Wirel. Pers. Commun. 114(4): 3247-3269 (2020)
2010 – 2019
- 2019
- [j22]Masoumeh Safkhani, Athanasios V. Vasilakos:
A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus. IEEE Access 7: 23514-23526 (2019) - [j21]S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri:
Relaxed Differential Fault Analysis of SHA-3. ISC Int. J. Inf. Secur. 11(2): 129-143 (2019) - [i20]Masoumeh Safkhani, Nasour Bagheri:
Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT. CoRR abs/1907.11322 (2019) - [i19]Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri:
On Designing Lightweight RFID Security Protocols for Medical IoT. IACR Cryptol. ePrint Arch. 2019: 851 (2019) - [i18]Farokhlagha Moazami, Masoumeh Safkhani:
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 1214 (2019) - 2018
- [j20]Masoumeh Safkhani, Nasour Bagheri, Mahyar Shariat:
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems. Future Internet 10(9): 82 (2018) - [j19]Nasour Bagheri, Seyed Farhad Aghili, Masoumeh Safkhani:
On the security of two ownership transfer protocols and their improvements. Int. Arab J. Inf. Technol. 15(1): 87-93 (2018) - [j18]Ygal Bendavid, Nasour Bagheri, Masoumeh Safkhani, Samad Rostampour:
IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function". Sensors 18(12): 4444 (2018) - [j17]Nasour Bagheri, Masoumeh Safkhani, Mojtaba Eslamnezhad Namin, Samad Rostampour:
An improved low-cost yoking proof protocol based on Kazahaya's flaws. J. Supercomput. 74(5): 1934-1948 (2018) - [j16]Masoumeh Safkhani, Mahyar Shariat:
Implementation of secret disclosure attack against two IoT lightweight authentication protocols. J. Supercomput. 74(11): 6220-6235 (2018) - 2017
- [j15]Nasour Bagheri, Parvin Alenaby, Masoumeh Safkhani:
A new anti-collision protocol based on information of collided tags in RFID systems. Int. J. Commun. Syst. 30(3) (2017) - [j14]Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the security of an RFID-based parking lot management system. Int. J. Commun. Syst. 30(15) (2017) - [j13]Masoumeh Safkhani, Nasour Bagheri:
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things. J. Supercomput. 73(8): 3579-3585 (2017) - [j12]Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri:
On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG. Wirel. Pers. Commun. 92(4): 1591-1597 (2017) - [c13]Hoda Jannati, Nasour Bagheri, Masoumeh Safkhani:
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors. ISCISC 2017: 31-36 - 2016
- [j11]Masoumeh Safkhani, Nasour Bagheri:
A note on the security of two improved RFID protocols. ISC Int. J. Inf. Secur. 8(2): 155-160 (2016) - [c12]Masoumeh Safkhani, Hoda Jannati, Nasour Bagheri:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. RFIDSec 2016: 3-16 - [i17]Masoumeh Safkhani, Nasour Bagheri:
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things. IACR Cryptol. ePrint Arch. 2016: 838 (2016) - [i16]Masoumeh Safkhani, Nasour Bagheri:
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols. IACR Cryptol. ePrint Arch. 2016: 905 (2016) - 2015
- [j10]Nasour Bagheri, Fatemeh Baghernejhad, Masoumeh Safkhani:
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs. Inf. Technol. Control. 44(1): 41-53 (2015) - [i15]Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. IACR Cryptol. ePrint Arch. 2015: 365 (2015) - [i14]Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. IACR Cryptol. ePrint Arch. 2015: 615 (2015) - 2014
- [j9]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
A note on the security of IS-RFID, an inpatient medication safety. Int. J. Medical Informatics 83(1): 82-85 (2014) - [j8]Masoumeh Safkhani, Nasour Bagheri, Ali Mahani:
On the security of RFID anti-counting security protocol (ACSP). J. Comput. Appl. Math. 259: 512-521 (2014) - [j7]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - [j6]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3-4): 799-805 (2014) - [j5]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. Secur. Commun. Networks 7(6): 945-949 (2014) - 2013
- [j4]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE Commun. Lett. 17(4): 805-807 (2013) - [j3]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Strengthening the Security of EPC C-1 G-2 RFID Standard. Wirel. Pers. Commun. 72(2): 1295-1308 (2013) - [c11]Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
Desynchronization and Traceability Attacks on RIPTA-DA Protocol. RFIDSec 2013: 57-68 - [c10]Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
On the Security of Two RFID Mutual Authentication Protocols. RFIDSec 2013: 86-99 - [i13]Nasour Bagheri, Masoumeh Safkhani:
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags. IACR Cryptol. ePrint Arch. 2013: 453 (2013) - [i12]Masoumeh Safkhani, Nasour Bagheri:
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes. IACR Cryptol. ePrint Arch. 2013: 490 (2013) - 2012
- [j2]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Designing of a Tamper Resistant Prescription RFID Access Control System. J. Medical Syst. 36(6): 3995-4004 (2012) - [c9]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c8]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c7]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa:
On the traceability of tags in SUAP RFID authentication protocols. RFID-TA 2012: 292-296 - [c6]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - [i11]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
How a Cryptographer Can Get Rich? IACR Cryptol. ePrint Arch. 2012: 23 (2012) - [i10]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Traceability of Tags in SUAP RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2012: 334 (2012) - [i9]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Cryptanalysis of RAPP, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2012: 702 (2012) - 2011
- [c5]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. ARES 2011: 581-584 - [c4]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. DPM/SETOP 2011: 90-103 - [c3]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Vulnerabilities in a new RFID access control protocol. ICITST 2011: 500-503 - [c2]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:
Security analysis of LMAP++, an RFID authentication protocol. ICITST 2011: 689-694 - [i8]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 61 (2011) - [i7]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 193 (2011) - [i6]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Chen et al.'s RFID Access Control Protocol. IACR Cryptol. ePrint Arch. 2011: 194 (2011) - [i5]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - [i4]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 424 (2011) - [i3]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. IACR Cryptol. ePrint Arch. 2011: 426 (2011) - [i2]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Security of RFID Anti Cloning Security Protocol(ACSP). IACR Cryptol. ePrint Arch. 2011: 563 (2011) - [i1]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Security Analysis of a PUF based RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 704 (2011) - 2010
- [j1]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri:
Cryptanalysis of AFMAP. IEICE Electron. Express 7(17): 1240-1245 (2010) - [c1]Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. INDOCRYPT 2010: 118-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint