Loading...
Search for: baghery--k
0.006 seconds

    Traceability analysis of recent RFID authentication protocols

    , Article Wireless Personal Communications ; Volume 83, Issue 3 , 2015 , Pages 1663-1682 ; 09296212 (ISSN) Alavi, S. M ; Baghery, K ; Abdolmaleki, B ; Aref, M. R ; Sharif University of Technology
    Abstract
    Radio frequency identification (RFID) technology is a prominent technology which has been used in most authentication and identification applications. Above all, recently RFID systems have got more attention as an interesting candidate to implement in the internet of things systems. Although RFID systems provide useful and interest services to users, they can also threat the security and the privacy of the end-users. In order to provide the security and the privacy of RFID users, different authentication protocols have been proposed. In this study, we analyze the privacy of three RFID authentication protocols that proposed recently. For our privacy analysis, we use a formal RFID privacy... 

    Securing key exchange and key agreement security schemes for RFID passive tags

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1475-1480 ; 9781467387897 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Alavi, S. M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability attacks on Zhang et al's protocol with success probability '1', and also we show that an attacker can impersonate the tag and the reader of Kim's protocol both with success probabilities '1/4'. We also present some modifications on the structure of studied schemes and propose two modified schemes... 

    Cryptanalysis of two EPC-based RFID security schemes

    , Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 116-121 ; 9781467376099 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard. It is shown that both the analyzed protocols have some drawbacks and are vulnerable to several security attacks including secret parameters reveal, impersonation, reader forward secrecy and also one of them does not provide date integrity. In addition, in order to overcome all the discovered... 

    Game-based privacy analysis of RFID security schemes for confident authentication in IoT

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 5057-5080 ; 09296212 (ISSN) Abdolmaleki, B ; Baghery, K ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed... 

    Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard

    , Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 111-116 ; 9781509034345 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their protocol suffers from secret parameters reveal, tag impersonation attack, backward and forward traceability attacks. Then, in order to enhance the security and the privacy of this protocol, a modified version is proposed. In order to evaluate our proposed protocol, its security and privacy are... 

    In vitro bactericidal and drug release properties of vancomycin-amino surface functionalized bioactive glass nanoparticles

    , Article Materials Chemistry and Physics ; Volume 241 , 2020 Zarghami, V ; Ghorbani, M ; Bagheri, K.P ; Shokrgozar, M. A ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Bioactive glass has been used clinically in bone repair applications for bone grafting because of its prominent physiochemical and osteogenic properties. Various attempts have been made to enhance bioactive glass efficiency in combination with other biomaterials such as antibiotics and growth factors. In present study, we developed a modification of bioactive glass nanoparticles that insured long term antibacterial effect. Bioactive glass nanoparticles (BGNs) were functionalized with (3-Aminopropyl) triethoxysilane (APTS), then vancomycin (VAN) was immobilized onto BGNs-APTS via EDC/NHS cross-linking process. Another study group namely BGNs-VAN was synthesized as a control group without any... 

    Green synthesis of PEG-coated MIL-100(Fe) for controlled release of dacarbazine and its anticancer potential against human melanoma cells

    , Article International Journal of Pharmaceutics ; Volume 618 , 2022 ; 03785173 (ISSN) Barjasteh, M ; Vossoughi, M ; Bagherzadeh, M ; Pooshang Bagheri, K ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    In this study, the potential of using MIL-100(Fe) metal–organic framework (MOF) for loading and controlling the release of dacarbazine (DTIC) was evaluated for in vitro treatment of melanoma. The drug loading was performed during the green synthesis of MIL-100(Fe) in an aqueous media without using any harmful solvents, to obtain MIL-DTIC. The surface of this structure was then coated with polyethylene glycol (PEG) in the same aqueous solution to synthesize MIL-DTIC-PEG. The synthesized samples were characterized using various methods. Their release profile was studied in phosphate-buffered saline (PBS) and simulated cutaneous medium (SCM). The cytotoxicity of DTIC and its nano-MOF... 

    Improving bactericidal performance of implant composite coatings by synergism between Melittin and tetracycline

    , Article Journal of Materials Science: Materials in Medicine ; Volume 33, Issue 6 , 2022 ; 09574530 (ISSN) Zarghami, V ; Ghorbani, M ; Pooshang Bagheri, K ; Shokrgozar, M. A ; Sharif University of Technology
    Springer  2022
    Abstract
    Methicillin resistance Staphylococcus aureus bacteria (MRSA) are serious hazards of bone implants. The present study was aimed to use the potential synergistic effects of Melittin and tetracycline to prevent MRSA associated bone implant infection. Chitosan/bioactive glass nanoparticles/tetracycline composite coatings were deposited on hydrothermally etched titanium substrate. Melittin was then coated on composite coatings by drop casting method. The surfaces were analyzed by FTIR, XRD, and SEM instruments. Tetracycline in coatings revealed multifunctional behaviors include bone regeneration and antibacterial activity. Releasing ALP enzyme from MC3T3 cells increased by tetracycline, so it is...