Masoumeh Safkhani
Masoumeh Safkhani
Shahid Rajaee Teacher Training University
Verified email at sru.ac.ir - Homepage
TitleCited byYear
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
362011
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
M Safkhani, P Peris-Lopez, JC Hernandez-Castro, N Bagheri
Journal of Computational and Applied Mathematics 259, 571-577, 2014
292014
Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things
M Safkhani, N Bagheri
The Journal of Supercomputing 73 (8), 3579-3585, 2017
182017
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols.
M Safkhani, N Bagheri
IACR Cryptology ePrint Archive 2016, 905, 2016
172016
A note on the security of IS-RFID, an inpatient medication safety
M Safkhani, N Bagheri, M Naderi
International Journal of Medical Informatics 83 (1), 82-85, 2014
172014
On the designing of a tamper resistant prescription rfid access control system
M Safkhani, N Bagheri, M Naderi
Journal of medical systems 36 (6), 3995-4004, 2012
172012
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
M Safkhani, P Peris-Lopez, N Bagheri, M Naderi, JC Hernandez-Castro
International Workshop on Radio Frequency Identification: Security and …, 2012
172012
Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP
N Bagheri, M Safkhani, P Peris‐Lopez, JE Tapiador
Security and Communication Networks 7 (6), 945-949, 2014
162014
Cryptanalysis of AFMAP
M Safkhani, M Naderi, N Bagheri
IEICE Electronics Express 7 (17), 1240-1245, 2010
162010
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
M Safkhani, N Bagheri, SK Sanadhya, M Naderi
IACR Cryptology ePrint Archive 2011, 426, 2011
132011
Tag impersonation attack on two RFID mutual authentication protocols
M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai
2011 Sixth International Conference on Availability, Reliability and …, 2011
122011
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
M Safkhani, P Peris-Lopez, JCH Castro, N Bagheri, M Naderi
IACR Cryptology ePrint Archive 2011, 331, 2011
122011
A new anti‐collision protocol based on information of collided tags in RFID systems
N Bagheri, P Alenaby, M Safkhani
International Journal of Communication Systems 30 (3), e2975, 2017
112017
Strengthening the security of EPC C-1 G-2 RFID standard
M Safkhani, N Bagheri, M Naderi
Wireless personal communications 72 (2), 1295-1308, 2013
112013
Weaknesses in another Gen2-based RFID authentication protocol
M Safkhani, N Bagheri, P Peris-Lopez, A Mitrokotsa, ...
2012 IEEE International Conference on RFID-Technologies and Applications …, 2012
112012
RFID in eHealth: How to combat medication errors and strengthen patient safety
P Peris-Lopez, M Safkhani, N Bagheri, M Naderi
Journal of Medical and Biological Engineering 33 (4), 363-372, 2013
102013
Cryptanalysis and improvement of a lightweight mutual authentication protocol for RFID system
M Safkhani, M Naderi
7th International ISC Conference on Information Security and Cryptology, 57-59, 2010
102010
On the security of RFID anti-counting security protocol (ACSP)
M Safkhani, N Bagheri, A Mahani
Journal of Computational and Applied Mathematics 259, 512-521, 2014
92014
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol
N Bagheri, M Safkhani, M Naderi
Neural Computing and Applications 24 (3-4), 799-805, 2014
92014
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation: No; PRNG with Concatenation: Yes.
M Safkhani, N Bagheri
IACR Cryptology ePrint Archive 2013, 490, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20