Nasour Bagheri
Orcid: 0000-0002-6818-5342
According to our database1,
Nasour Bagheri
authored at least 135 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Toward designing a lightweight RFID authentication protocol for constrained environments.
IET Commun., August, 2024
Frontiers Comput. Sci., August, 2024
IEEE Internet Things J., February, 2024
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
J. Supercomput., January, 2024
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
J. Supercomput., January, 2024
Future Internet, 2024
2023
Peer Peer Netw. Appl., August, 2023
IET Inf. Secur., July, 2023
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.
Sensors, January, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEEE Syst. J., 2022
J. Parallel Distributed Comput., 2022
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols.
J. Inf. Secur. Appl., 2022
ISC Int. J. Inf. Secur., 2022
IEEE Internet Things J., 2022
2021
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing.
Veh. Commun., 2021
J. Supercomput., 2021
Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths.
Microprocess. Microsystems, 2021
On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments.
J. Ambient Intell. Humaniz. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK.
Des. Codes Cryptogr., 2021
A Recurrent Temporal Model for Semantic Levels Categorization Based on Human Visual System.
Comput. Intell. Neurosci., 2021
Object Categorization at the Higher Levels Do With More Neurons Than Finer Levels and Takes Faster.
IEEE Access, 2021
2020
Pervasive Mob. Comput., 2020
Microprocess. Microsystems, 2020
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.
ISC Int. J. Inf. Secur., 2020
ISC Int. J. Inf. Secur., 2020
IET Image Process., 2020
Proposing an MILP-based Method for the Experimental Verification of Difference Trails.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.
Comput. Networks, 2020
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments.
IEEE Access, 2020
IEEE Access, 2020
2019
ISC Int. J. Inf. Secur., 2019
Security analysis of SIMECK block cipher against related-key impossible differential.
Inf. Process. Lett., 2019
Int. J. Netw. Secur., 2019
IET Circuits Devices Syst., 2019
IACR Cryptol. ePrint Arch., 2019
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme.
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP.
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles.
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT.
CoRR, 2019
IEEE Access, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.
J. Supercomput., 2018
J. Supercomput., 2018
Telecommun. Syst., 2018
IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".
Sensors, 2018
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher.
IET Inf. Secur., 2018
Int. Arab J. Inf. Technol., 2018
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems.
Future Internet, 2018
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018
2017
Wirel. Pers. Commun., 2017
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things.
J. Supercomput., 2017
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Secur. Commun. Networks, 2016
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI<sup>+</sup> protocols.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Secur. Commun. Networks, 2015
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs.
Inf. Technol. Control., 2015
On the (im)possibility of receiving security beyond 2<sup>l</sup> using an l-bit PRNG: the case of Wang et. al. protocol.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
2014
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Secur. Commun. Networks, 2014
Neural Comput. Appl., 2014
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Comput. Appl. Math., 2014
J. Comput. Appl. Math., 2014
ISC Int. J. Inf. Secur., 2014
Int. J. Medical Informatics, 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
2013
Multiple classifier system for EEG signal classification with application to brain-computer interfaces.
Neural Comput. Appl., 2013
J. Medical Syst., 2013
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Commun. Lett., 2013
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Radio Frequency Identification, 2013
2012
J. Medical Syst., 2012
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
Int. J. Inf. Sec., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
2011
Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of improved Yeh <i>et al.</i>'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
IET Inf. Secur., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
Multi-Collisions Attack in Ring Hash Structure.
Proceedings of the SECRYPT 2008, 2008