dr. masoumeh safkhani
Assistant professor
- Email: Safkhani@sru.ac.ir
- tel:00982122970117
- fax:00982122970117
- Faculty of Computer Engineering
- Department of Computer Systems Architecture
Research Interests:
Caption | |
---|---|
1 | Design and Cryptanalysis of Security Protocols |
2 | Design and Cryptanalysis of Cryptography Primitives |
3 | RFID Security |
4 | Network Security |
Educational Background
Section | university | CatchDate | |
---|---|---|---|
1 | Diploma | National Organization for Development of Exceptional Talents | 2000 |
2 | BSc. | Iran University of Science and Technology, Tehran, Iran | 2004 |
3 | MSc. | Iran University of Science and Technology, Tehran, Iran | 2007 |
4 | Phd. | Iran University of Science and Technology, Tehran, Iran | 2013 |
Professional Background
Row | Caption | place | Date |
1 | Responsible for Approving BSC. Projects | Faculty of Computer Engineering | Fall 2014-until now |
2 | Head of Department of Architecture of Computer Systems | Faculty of Computer Engineering | Fall 2015- until now |
Referee for Journals
Caption | place | Date | |
---|---|---|---|
1 | Journal of Electronics Industries | Iran Electronics Industries | 2014-2015 |
2 | ISeCure | Iran Society of Cryptology | 2013-2015 |
3 | International Journal of Communication Systems | John Wiley & Sons Ltd | 2013 |
4 | International Journal of Information Security | Springer | 2012-2013 |
5 | IEEE Sensors Journal | IEEE | 2012-2013 |
6 | Neural Computing and Applications (NCA) | Springer | 2012 |
7 | Journal of Electrical and Computer Engineering Innovations | Shahid Rajaee Teacher Training University | 2016 |
Journal Papers
Title | Authors | journal | publish year | Comments | ||
---|---|---|---|---|---|---|
1 | On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 | Masoumeh Safkhan, Fatemeh Baghernejhad, Nasour Bagheri | Information Technology and Control, Vol. 44, No.1, | 2015 | Published | |
2 | A new anti-collision protocol based on information of collided tags in RFID systems | Nasour Bagheri, Parvin Alenaby and Masoumeh Safkhani | International Journal of Communication Systems | 2015 | Published | |
3 | A Note on the Security of IS-RFID, an Inpatient Medication Safety | M. Safkhani, N. Bagheri and M. Naderi | International Journal of Medical Informatics, Vol. 83, pp. 82-85, | 2014 | Published | |
4 | Cryptanalysis of Cho et al.’s protocol: A hash-based RFID tag mutual authentication protocol | M. Safkhani, P. Peris-Lopez, J. Cesar Hernandez-Castro, N. Bagheri, | Journal of Computational and Applied Mathematics, Vol. 259, pp. 571-577, 2014. | 2014 | Published | |
5 | On the Security of RFID Anti Counting Security Protocol(ACSP) | N. Bagheri, M. Safkhani, M. Naderi, A. Mahani | Journal of Computational and Applied Mathematics ,Vol. 259, pp. 512-521, 2014. | 2014 | Published | |
6 | Cryptanalysis of RAPP, an RFID Authentication Protocol | N. Bagheri, M. Safkhani, P. Peris-Lopez, J. E.Tapiador, | Security and Communication Networks, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.803, 2013. | 2013 | Published | |
7 | Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6 | N. Bagheri, M. Safkhani, P. Peris-Lopez and J. E. Tapiador | IEEE Communications Letters, 17(4): 805-807, 2013 | 2013 | Published | |
8 | Strengthening the Security of EPC C-1 G-2 RFID Standard | M. Safkhani, N. Bagheri and M. Naderi | Wireless Personal Communications, DOI 10.1007/s11277-013-1078-z, Springer, 2013. | 2013 | Published | |
9 | Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol | N. Bagheri, M. Safkhani and M. Naderi, | Neural Computing and Applications, DOI 10.1007/s00521-012-1283-9, Springer, Dec. 2012 | 2012 | Published | |
10 | RFID in eHealth: How Combat Medications Errors and Strengthen Patient Safety | P. Peris-Lopez, M. Safkhani, N. Bagheri and Majid Naderi | ”, Journal of Medical and Biological Engineering, Vol. 33, No. 4, pp. 363-372, 2013 | 2013 | Published | |
11 | On the Designing of a Tamper Resistant Prescription RFID Access Control System | M. Safkhani, N. Bagheri and M. Naderi, | Journal of Medical Systems, Special Issue on RFID, Vol. 36, pp. 3995-4004, Dec. 2012 | 2012 | Published | |
12 | Cryptanalysis of AFMAP | M. Safkhani, M. Naderi and N. Bagheri, | IEICE Electronics Express, Vol.7, No. 17, pp. 1240-1245, 2010. | 2010 | Published | |
13 | Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols | N. Bagheri, M. Safkhani, M. Naderi, Y. Luo and Q. Chai, | International Journal of Information & Communication Technology Research (IJICTR), Vol. 3. No. 4, pp. 33-43, June 2012. | 2012 | Published | |
14 | Cryptanalysis of SEAS, an RFID Authentication Protocol | M. Safkhani, N. Bagheri, M. Naderi | SAIRAN’s journal (in persian), pp. 77-92, 2011. | 2011 | Published | |
15 | Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol (FLMAP) | M. Safkhani, M. Naderi and H. F. Rashvand, | International Journal of Computer & Communication Technology (IJCCT), Vol. 2, No. 2,3,4, pp. 182-186, 2010. | 2010 | Published | |
Conference Papers
Row | Date | Conference title | Place | Paper title | Authors |
1 | 2014 | 7th International Conference on Information Security and Cryptology (ISCTURKEY 2014), pp. 1-4, 2014. | Istanbul- Turkey | Employing a Secure Cipher Does not Guarantee the Security of RFID Protocols | Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Juan M. E. Tapiador, |
2 | 2014 | 7th International Conference on Information Security and Cryptology, (ISCTURKEY 2014), pp. 1-4, 2014. | Istanbul- Turkey | On the security of Lo et al.’s ownership transfer protocol | Nasour Bagheri, Pedro Masoumeh Safkhani |
3 | 2013 | RFIDsec 2013 . | Graz, Austria | The Resistance to Intermittent Position Trace Attacks and Desynchronization Attacks (RIPTA-DA) Protocol Is Not RIPTA-DA”, | N. Bagheri, P. Gauravaram, M. Safkhani, and S. Kumar Sanadhya |
4 | 2013 | RFIDsec 2013. | Graz, Austria | On the Security of two RFID Mutual Authentication Protocols, | S. F. Aghili, N. Bagheri, P. Gauravaram, M. Safkhani, and S. Kumar Sanadhya |
5 | 2012 | RFID-TA 2012,pp. 80-84, 2012 | Paris, France | Weaknesses in another Gen2-based RFID authentication protocol | M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, J. C. Hernandez-Castro, |
6 | 2012 | RFID-TA 2012, pp. 292-296, 2012. | Paris, France | On the traceability of tags in SUAP RFID authentication protocols | M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, |
7 | 2012 | .ICACM’12, 2012. | Ankara, Turkey | On the Security of RFID Anti Counting Security Protocol (ACSP) | N. Bagheri, M. Safkhani, M. Naderi, A. Mahani |
8 | 2012 | ICACM’12, 2012. | Ankara, Turkey | Cryptanalysis of Cho et al.’s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems | M. Safkhani, P. Peris-Lopez, J. César Hernández Castro, Nasour Bagheri, M. Naderi, |
9 | 2012 | RFIDsec 2012, pp. 1-19, 2012. | Netherlands | On the Security of Tan et al. Serverless RFID Authentication and Search Protocols | M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, J. Cesar Hernandez-Castro |
10 | 2012 | WISTP, pp. 29-37, 2012. | London, UK | Another Fallen Hash-Based RFID Authentication Protocol | J.César Hernández Castro, P. Peris-Lopez, M. Safkhani, N. Bagheri,M. Naderi |
11 | 2012 | DPM 2011 and SETOP 2011, Volume of 7122 of LNCS, pp. 90-103, 2012. | Belgium | On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol | M. Safkhani, N. Bagheri, S. K. Sanadhya, M. Naderi and H. Behnam |
12 | 2011 | 6th International Conference on Internet Technology and Secured Transactions, pp. 689-694, 11-14 December 2011, Abu Dhabi, United Arab Emirates, 2011. | Abu Dhabi, Emirates | Security Analysis of LMAP++, an RFID Authentication Protocol | M. Safkhani, N. Bagheri, M. Naderi, Somitra Kumar Sanadhya, |
13 | 2011 | 6th International Conference on Internet Technology and Secured Transactions, pp. 500-503, 11-14 December 2011, Abu Dhabi, United Arab Emirates,2011. | Abu Dhabi, Emirates | Vulnerabilities in a new RFID Access Control Protocol | M. Safkhani, N. Bagheri, M. Naderi, |
14 | 2011 | ARES 2011, pp.581-584, 2011. | ا Vienna, Austria | Tag Impersonation Attack on Two RFID Mutual Authentication Protocols | M. Safkhani, N. Bagheri, M. Naderi, Y. Luo, Q. Chai |
15 | 2010 | ISCISC2010, pp. 57-59, Tehran, Iran, 2010. | Tehran, Iran | Cryptanalysis and Improvement of a Lightweight Mutual Authentication Protocol for RFID system | M. Safkhani and M. Naderi, |
16 | 2010 | INDOCRYPT 2010, LNCS 6498, pp. 118–130, 2010. | Heydarabad, India | Cryptanalysis of Tav-128 Hash function | A. Kumar, S. Kumar Sanadhya, Praveen Gauravaram, M. Safkhani and M. Naderi, |
17 | 2009 | ICEE 2009. | Tehran, Iran | Cryptanlysis of the L-pipe Hash Structure | N. Bagheri, M. Naderi, M. Safkhani |
18 | 2008 | CSICC 2008.(in Persian). | Kish Island, Iran | Cryptanlysis of AHS-AES Hash Structure | . N. Bagheri, M. Naderi, B. Sadeghiyan, M. Safkhani |
Research Projects
Row | Title | Project Leader | Year | Employer | comments |
1 | Improvement of Anti-collision Protocols in RFID Systems | Masoumeh Safkhani | Summer 2015 | Shahid Rajaee Teacher Training University |
Books
Book | TitleBook | ||
---|---|---|---|
1 | Hash Function: Principles & Applications | 2008 | IranUniversity of science & technology publications, No.447, 2008. |
Courses Taught
caption | Section | StartYear | EndYear | |
---|---|---|---|---|
1 | Computer Architecture | BSc. | Fall 2014 | Until now |
2 | Computer Networks | BSc. | Fall 2014 | Until now |
3 | Advanced Computer Networks | MSc.& Phd. | Fall 2014 | Until now |
4 | Computer Architecture Lab | BSc. | Fall 2014 | Until now |
5 | Microprocessors I | BSc. | Spring 2015 | Until now |
6 | Microprocessors Lab | BSc. | Spring 2015 | Until now |
7 | Advanced Network Security | MSc.& Phd. | Spring 2014 | Until now |
8 | Cryptography | MSc.& Phd. | Fall 2014 | Until now |
9 | Security Protocols | MSc.& Phd. | Spring 2015 | Until now |
Workshops
Row | Title | Place | Date |
1 | Security Analysis of SNMP | CyberSpace Research Institute | Tehran, Jan. 2012. |
2 | Introduction to RFID Systems | Department of Electrical engineering, Guilan University | Rasht, February 2012 |
3 | Command and Control networks’ Simulation with OPNET | 4th Conference of Iran’s Scientific Society of Command, Control, Communications, Computers and Intelligences(C4I), | Department of Electrical engineering, Sharif University of Technology, Tehran, October 2010 |
4 | Introduction to OPNET Software | 3rd Conference of Iran’s Scientific Society of Command, Control, Communications, Computers and Intelligences(C4I), | Department of Electrical engineering, Malek Ashtar University of Technology, Tehran, October 2009 |