{"id":1430,"date":"2016-07-02T18:45:14","date_gmt":"2016-07-02T18:45:14","guid":{"rendered":"http:\/\/www.sru.ac.ir\/en\/?page_id=1430"},"modified":"2017-02-07T09:48:05","modified_gmt":"2017-02-07T06:18:05","slug":"drsafkhanienresume","status":"publish","type":"page","link":"https:\/\/www.sru.ac.ir\/en\/drsafkhanienresume\/","title":{"rendered":"DrSafkhaniEnResume"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1486448412372{border-left-width: 25px !important;padding-left: 15px !important;}&#8221;]<\/p>\n<p style=\"color: #333333; font-family: tahoma; font-size: 12px; line-height: 20px; text-align: left;\"><span style=\"font-size: 22px;\"><span style=\"font-family: times new roman,times,serif; color: #126698 !important;\"><strong>dr. masoumeh safkhani<br \/>\n<\/strong><\/span><\/span><\/p>\n<p style=\"color: #333333; font-family: tahoma; font-size: 12px; line-height: 20px; text-align: left;\"><span style=\"font-size: 22px;\"><span style=\"font-family: times new roman,times,serif; color: #126698 !important;\"><strong>Assistant professor<\/strong><\/span><\/span><\/p>\n<ul>\n<li>Email:\u00a0<a href=\"mailto:Safkhani@sru.ac.ir,m.safkhani@gmail.com\">Safkhani@sru.ac.ir<\/a><\/li>\n<li>tel:00982122970117<\/li>\n<li>fax:00982122970117<\/li>\n<li>Faculty of Computer Engineering<\/li>\n<li>Department of \u00a0Computer Systems Architecture<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1460800436555{border-right-width: 25px !important;padding-right: 15px !important;}&#8221;]<\/p>\n<p><a href=\"http:\/\/www.sru.ac.ir\/wp-content\/uploads\/2016\/04\/265-187x300.jpg\"><img loading=\"lazy\" class=\" wp-image-14194 alignright\" src=\"http:\/\/www.sru.ac.ir\/wp-content\/uploads\/2016\/04\/265-187x300-187x300.jpg\" alt=\"265-187x300\" width=\"113\" height=\"181\" \/><\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/1&#8243;][vc_tabs][vc_tab title=&#8221;Profile&#8221; tab_id=&#8221;1446618295-1-16&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: left !important;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Research Interests: <\/span><\/strong><\/h4>\n<div>\n<table id=\"grdData2\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\"><\/th>\n<th scope=\"col\">Caption<\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"48\">1<\/td>\n<td width=\"576\">Design and Cryptanalysis of Security Protocols<\/td>\n<\/tr>\n<tr>\n<td width=\"48\">2<\/td>\n<td width=\"576\">Design and Cryptanalysis of Cryptography Primitives<\/td>\n<\/tr>\n<tr>\n<td width=\"48\">3<\/td>\n<td width=\"576\">RFID Security<\/td>\n<\/tr>\n<tr>\n<td width=\"48\">4<\/td>\n<td width=\"576\">Network Security<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div><\/div>\n<div><\/div>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Educational Background<\/span><\/strong><\/h4>\n<div style=\"text-align: left;\">\n<table id=\"grdDta12\" class=\"mGrid\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\"><\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">Section<\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">university<\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">CatchDate<\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"124\">1<\/td>\n<td width=\"136\">Diploma<\/td>\n<td width=\"172\">National Organization for Development of Exceptional Talents<\/td>\n<td width=\"149\">2000<\/td>\n<\/tr>\n<tr>\n<td width=\"124\">2<\/td>\n<td width=\"136\">BSc.<\/td>\n<td width=\"172\">Iran University of Science and Technology, Tehran, Iran<\/td>\n<td width=\"149\">2004<\/td>\n<\/tr>\n<tr>\n<td width=\"124\">3<\/td>\n<td width=\"136\">MSc.<\/td>\n<td width=\"172\">Iran University of Science and Technology, Tehran, Iran<\/td>\n<td width=\"149\">2007<\/td>\n<\/tr>\n<tr>\n<td width=\"124\">4<\/td>\n<td width=\"136\">Phd.<\/td>\n<td width=\"172\">Iran University of Science and Technology, Tehran, Iran<\/td>\n<td width=\"149\">2013<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h4 style=\"text-align: left;\"><\/h4>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Professional Background<\/span><\/strong><\/h4>\n<div style=\"text-align: left;\"><\/div>\n<h4 style=\"text-align: left;\"><\/h4>\n<table>\n<tbody>\n<tr>\n<td width=\"44\"><strong>Row<\/strong><\/td>\n<td width=\"268\"><strong>Caption<\/strong><\/td>\n<td width=\"228\"><strong>place<\/strong><\/td>\n<td width=\"84\"><strong>Date<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"44\">1<\/td>\n<td width=\"268\">Responsible for Approving BSC. Projects<\/td>\n<td width=\"228\">Faculty of Computer Engineering<\/td>\n<td width=\"84\">Fall 2014-until now<\/td>\n<\/tr>\n<tr>\n<td width=\"44\">2<\/td>\n<td width=\"268\">Head of Department of Architecture of Computer Systems<\/td>\n<td width=\"228\">Faculty of Computer Engineering<\/td>\n<td width=\"84\">Fall 2015- until now<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4 style=\"text-align: left;\"><span style=\"font-size: 20px; color: #126698 !important;\"><strong>Referee for Journals<\/strong><\/span><\/h4>\n<div>\n<table id=\"grdData11\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\"><\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">Caption<\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">place<\/th>\n<th style=\"font-family: inherit; font-size: inherit; text-align: left;\" scope=\"col\">Date<\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"54\">1<\/td>\n<td width=\"288\"><a href=\"http:\/\/journal.sairan.ir\/\">Journal of Electronics Industries<\/a><\/td>\n<td width=\"186\">Iran Electronics Industries<\/td>\n<td width=\"96\">2014-2015<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">2<\/td>\n<td width=\"288\">ISeCure<\/td>\n<td width=\"186\">Iran Society of Cryptology<\/td>\n<td width=\"96\">2013-2015<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">3<\/td>\n<td width=\"288\">International Journal of Communication Systems<\/td>\n<td width=\"186\">John Wiley &amp; Sons Ltd<\/td>\n<td width=\"96\">2013<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">4<\/td>\n<td width=\"288\">International Journal of Information Security<\/td>\n<td width=\"186\">Springer<\/td>\n<td width=\"96\">2012-2013<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">5<\/td>\n<td width=\"288\">IEEE Sensors Journal<\/td>\n<td width=\"186\">IEEE<\/td>\n<td width=\"96\">2012-2013<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">6<\/td>\n<td width=\"288\">Neural Computing and Applications (NCA)<\/td>\n<td width=\"186\">Springer<\/td>\n<td width=\"96\">2012<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td style=\"font-family: inherit; font-size: inherit;\">7<\/td>\n<td style=\"font-family: inherit; font-size: inherit;\">Journal of Electrical and Computer Engineering Innovations<\/td>\n<td style=\"font-family: inherit; font-size: inherit;\">Shahid Rajaee Teacher Training University<\/td>\n<td style=\"font-family: inherit; font-size: inherit;\">2016<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<td style=\"font-family: inherit; font-size: inherit;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div><\/div>\n<p>&nbsp;<\/p>\n<div>\n<table id=\"grdData2\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\"><\/th>\n<th scope=\"col\"><\/th>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Journal Paper&#8221; tab_id=&#8221;1447500656296-3-10&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Journal Papers<\/span><\/strong><\/h4>\n<div>\n<table id=\"grdData\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\"><\/th>\n<th scope=\"col\">Title<\/th>\n<th scope=\"col\">Authors<\/th>\n<th scope=\"col\">journal<\/th>\n<th scope=\"col\">publish year<\/th>\n<th scope=\"col\">Comments<\/th>\n<th scope=\"col\">Pdf<\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"30\">1<\/td>\n<td width=\"131\">On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2<\/td>\n<td width=\"108\">Masoumeh Safkhan, Fatemeh Baghernejhad, Nasour Bagheri<\/td>\n<td width=\"168\">Information Technology and Control, Vol. 44, No.1,<\/td>\n<td width=\"108\">2015<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">2<\/td>\n<td width=\"131\">A new anti-collision protocol based on information of collided tags in RFID systems<\/td>\n<td width=\"108\">Nasour Bagheri, Parvin Alenaby and Masoumeh Safkhani<\/td>\n<td width=\"168\">International Journal of Communication Systems<\/td>\n<td width=\"108\">2015<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">3<\/td>\n<td width=\"131\">A Note on the Security of IS-RFID, an Inpatient Medication Safety<\/td>\n<td width=\"108\">M. Safkhani, N. Bagheri and M. Naderi<\/td>\n<td width=\"168\">International Journal of Medical Informatics, Vol. 83, pp. 82-85,<\/td>\n<td width=\"108\">2014<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">4<\/td>\n<td width=\"131\">Cryptanalysis of Cho et al.\u2019s protocol: A hash-based RFID tag mutual authentication protocol<\/td>\n<td width=\"108\">M. Safkhani, P. Peris-Lopez, J. Cesar Hernandez-Castro, N. Bagheri,<\/td>\n<td width=\"168\">Journal of Computational and Applied Mathematics, Vol. 259, pp. 571-577, 2014.<\/td>\n<td width=\"108\">2014<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">5<\/td>\n<td width=\"131\">On the Security of RFID Anti Counting Security Protocol(ACSP)<\/td>\n<td width=\"108\">N. Bagheri, M. Safkhani, M. Naderi, A. Mahani<\/td>\n<td width=\"168\">Journal of Computational and Applied Mathematics ,Vol. 259, pp. 512-521, 2014.<\/td>\n<td width=\"108\">2014<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">6<\/td>\n<td width=\"131\">Cryptanalysis of RAPP, an RFID Authentication Protocol<\/td>\n<td width=\"108\">N. Bagheri, M. Safkhani, P. Peris-Lopez, J. E.Tapiador,<\/td>\n<td width=\"168\">Security and Communication Networks, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002\/sec.803, 2013.<\/td>\n<td width=\"108\">2013<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">7<\/td>\n<td width=\"131\">Security Improvement of an RFID Security Protocol of ISO\/IEC WD 29167-6<\/td>\n<td width=\"108\">N. Bagheri, M. Safkhani, P. Peris-Lopez and J. E. Tapiador<\/td>\n<td width=\"168\">IEEE Communications Letters, 17(4): 805-807, 2013<\/td>\n<td width=\"108\">2013<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">8<\/td>\n<td width=\"131\">Strengthening the Security of EPC C-1 G-2 RFID Standard<\/td>\n<td width=\"108\">M. Safkhani, N. Bagheri and M. Naderi<\/td>\n<td width=\"168\">Wireless Personal Communications, DOI 10.1007\/s11277-013-1078-z, Springer, 2013.<\/td>\n<td width=\"108\">2013<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">9<\/td>\n<td width=\"131\">Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol<\/td>\n<td width=\"108\">N. Bagheri, M. Safkhani and M. Naderi,<\/td>\n<td width=\"168\">Neural Computing and Applications, DOI 10.1007\/s00521-012-1283-9, Springer, Dec. 2012<\/td>\n<td width=\"108\">2012<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">10<\/td>\n<td width=\"131\">RFID in eHealth: How Combat Medications Errors and Strengthen Patient Safety<\/td>\n<td width=\"108\">P. Peris-Lopez, M. Safkhani, N. Bagheri and Majid Naderi<\/td>\n<td width=\"168\">\u201d, Journal of Medical and Biological Engineering, Vol. 33, No. 4, pp. 363-372, 2013<\/td>\n<td width=\"108\">2013<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">11<\/td>\n<td width=\"131\">On the Designing of a Tamper Resistant Prescription RFID Access Control System<\/td>\n<td width=\"108\">M. Safkhani, N. Bagheri and M. Naderi,<\/td>\n<td width=\"168\">Journal of Medical Systems, Special Issue on RFID, Vol. 36, pp. 3995-4004, Dec. 2012<\/td>\n<td width=\"108\">2012<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">12<\/td>\n<td width=\"131\">Cryptanalysis of AFMAP<\/td>\n<td width=\"108\">M. Safkhani, M. Naderi and N. Bagheri,<\/td>\n<td width=\"168\">IEICE Electronics Express, Vol.7, No. 17, pp. 1240-1245, 2010.<\/td>\n<td width=\"108\">2010<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">13<\/td>\n<td width=\"131\">Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols<\/td>\n<td width=\"108\">N. Bagheri, M. Safkhani, M. Naderi, Y. Luo and Q. Chai,<\/td>\n<td width=\"168\">International Journal of Information &amp; Communication Technology Research (IJICTR), Vol. 3. No. 4, pp. 33-43, June 2012.<\/td>\n<td width=\"108\">2012<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">14<\/td>\n<td width=\"131\">Cryptanalysis of SEAS, an RFID Authentication Protocol<\/td>\n<td width=\"108\">M. Safkhani, N. Bagheri, M. Naderi<\/td>\n<td width=\"168\">SAIRAN\u2019s journal (in persian), pp. 77-92, 2011.<\/td>\n<td width=\"108\">2011<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<tr>\n<td width=\"30\">15<\/td>\n<td width=\"131\">Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol (FLMAP)<\/td>\n<td width=\"108\">M. Safkhani, M. Naderi and H. F. Rashvand,<\/td>\n<td width=\"168\">International Journal of Computer &amp; Communication Technology (IJCCT), Vol. 2, No. 2,3,4, pp. 182-186, 2010.<\/td>\n<td width=\"108\">2010<\/td>\n<td width=\"77\">Published<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Confrence Paper&#8221; tab_id=&#8221;1447500686067-4-3&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Conference Papers<\/span><\/strong><\/h4>\n<table>\n<tbody>\n<tr>\n<td width=\"100\"><strong>Row<\/strong><\/td>\n<td width=\"101\"><strong>Date<\/strong><\/td>\n<td width=\"104\"><strong>Conference title<\/strong><\/td>\n<td width=\"101\"><strong>Place<\/strong><\/td>\n<td width=\"115\"><strong>Paper title<\/strong><\/td>\n<td width=\"103\"><strong>Authors<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"100\">1<\/td>\n<td width=\"101\">2014<\/td>\n<td width=\"104\">7th International Conference on Information Security and Cryptology (ISCTURKEY 2014), pp. 1-4, 2014.<\/td>\n<td width=\"101\">Istanbul- Turkey<\/td>\n<td width=\"115\">Employing a Secure Cipher Does not Guarantee the Security of RFID Protocols<\/td>\n<td width=\"103\">Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Juan M. E. Tapiador,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">2<\/td>\n<td width=\"101\">2014<\/td>\n<td width=\"104\">7th International Conference on Information Security and Cryptology, (ISCTURKEY 2014), pp. 1-4, 2014.<\/td>\n<td width=\"101\">Istanbul- Turkey<\/td>\n<td width=\"115\">On the security of Lo et al.&#8217;s ownership transfer protocol<\/td>\n<td width=\"103\">Nasour Bagheri, Pedro Masoumeh Safkhani<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">3<\/td>\n<td width=\"101\">2013<\/td>\n<td width=\"104\">RFIDsec 2013 .<\/td>\n<td width=\"101\">Graz, Austria<\/td>\n<td width=\"115\">The Resistance to Intermittent Position Trace Attacks and Desynchronization Attacks (RIPTA-DA) Protocol Is Not RIPTA-DA\u201d,<\/td>\n<td width=\"103\">N. Bagheri, P. Gauravaram, M. Safkhani, and S. Kumar Sanadhya<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">4<\/td>\n<td width=\"101\">2013<\/td>\n<td width=\"104\">RFIDsec 2013.<\/td>\n<td width=\"101\">Graz, Austria<\/td>\n<td width=\"115\">On the Security of two RFID Mutual Authentication Protocols,<\/td>\n<td width=\"103\">S. F. Aghili, N. Bagheri, P. Gauravaram, M. Safkhani, and S. Kumar Sanadhya<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">5<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">RFID-TA 2012,pp. 80-84, 2012<\/td>\n<td width=\"101\">Paris, France<\/td>\n<td width=\"115\">Weaknesses in another Gen2-based RFID authentication protocol<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, J. C. Hernandez-Castro,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">6<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">RFID-TA 2012, pp. 292-296, 2012.<\/td>\n<td width=\"101\">Paris, France<\/td>\n<td width=\"115\">On the traceability of tags in SUAP RFID authentication protocols<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">7<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">.ICACM\u201912, 2012.<\/td>\n<td width=\"101\">Ankara, Turkey<\/td>\n<td width=\"115\">On the Security of RFID Anti Counting Security Protocol (ACSP)<\/td>\n<td width=\"103\">N. Bagheri, M. Safkhani, M. Naderi, A. Mahani<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">8<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">ICACM\u201912, 2012.<\/td>\n<td width=\"101\">Ankara, Turkey<\/td>\n<td width=\"115\">Cryptanalysis of Cho et al.&#8217;s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems<\/td>\n<td width=\"103\">M. Safkhani, P. Peris-Lopez, J. C\u00e9sar Hern\u00e1ndez Castro, Nasour Bagheri, M. Naderi,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">9<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">RFIDsec 2012, pp. 1-19, 2012.<\/td>\n<td width=\"101\">Netherlands<\/td>\n<td width=\"115\">On the Security of Tan et al. Serverless RFID Authentication and Search Protocols<\/td>\n<td width=\"103\">M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, J. Cesar Hernandez-Castro<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">10<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">WISTP, pp. 29-37, 2012.<\/td>\n<td width=\"101\">London, UK<\/td>\n<td width=\"115\">Another Fallen Hash-Based RFID Authentication Protocol<\/td>\n<td width=\"103\">J.C\u00e9sar Hern\u00e1ndez Castro, P. Peris-Lopez, M. Safkhani, N. Bagheri,M. Naderi<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">11<\/td>\n<td width=\"101\">2012<\/td>\n<td width=\"104\">DPM 2011 and SETOP 2011, Volume of 7122 of LNCS, pp. 90-103, 2012.<\/td>\n<td width=\"101\">Belgium<\/td>\n<td width=\"115\">On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.&#8217;s Protocol<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, S. K. Sanadhya, M. Naderi and H. Behnam<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">12<\/td>\n<td width=\"101\">2011<\/td>\n<td width=\"104\">6th International Conference on Internet Technology and Secured Transactions, pp. 689-694, 11-14 December 2011, Abu Dhabi, United Arab Emirates, 2011.<\/td>\n<td width=\"101\">Abu Dhabi, Emirates<\/td>\n<td width=\"115\">Security Analysis of LMAP++, an RFID Authentication Protocol<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, M. Naderi, Somitra Kumar Sanadhya,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">13<\/td>\n<td width=\"101\">2011<\/td>\n<td width=\"104\">6th International Conference on Internet Technology and Secured Transactions, pp. 500-503, 11-14 December 2011, Abu Dhabi, United Arab Emirates,2011.<\/td>\n<td width=\"101\">Abu Dhabi, Emirates<\/td>\n<td width=\"115\">Vulnerabilities in a new RFID Access Control Protocol<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, M. Naderi,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">14<\/td>\n<td width=\"101\">2011<\/td>\n<td width=\"104\">ARES 2011, pp.581-584, 2011.<\/td>\n<td width=\"101\">\u0627 Vienna, Austria<\/td>\n<td width=\"115\">Tag Impersonation Attack on Two RFID Mutual Authentication Protocols<\/td>\n<td width=\"103\">M. Safkhani, N. Bagheri, M. Naderi, Y. Luo, Q. Chai<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">15<\/td>\n<td width=\"101\">2010<\/td>\n<td width=\"104\">ISCISC2010, pp. 57-59, Tehran, Iran, 2010.<\/td>\n<td width=\"101\">Tehran, Iran<\/td>\n<td width=\"115\">Cryptanalysis and Improvement of a Lightweight Mutual Authentication Protocol for RFID system<\/td>\n<td width=\"103\">M. Safkhani and M. Naderi,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">16<\/td>\n<td width=\"101\">2010<\/td>\n<td width=\"104\">INDOCRYPT 2010, LNCS 6498, pp. 118\u2013130, 2010.<\/td>\n<td width=\"101\">Heydarabad, India<\/td>\n<td width=\"115\">Cryptanalysis of Tav-128 Hash function<\/td>\n<td width=\"103\">A. Kumar, S. Kumar Sanadhya, Praveen Gauravaram, M. Safkhani and M. Naderi,<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">17<\/td>\n<td width=\"101\">2009<\/td>\n<td width=\"104\">ICEE 2009.<\/td>\n<td width=\"101\">Tehran, Iran<\/td>\n<td width=\"115\">Cryptanlysis of the L-pipe Hash Structure<\/td>\n<td width=\"103\">N. Bagheri, M. Naderi, M. Safkhani<\/td>\n<\/tr>\n<tr>\n<td width=\"100\">18<\/td>\n<td width=\"101\">2008<\/td>\n<td width=\"104\">CSICC 2008.(in Persian).<\/td>\n<td width=\"101\">Kish Island, Iran<\/td>\n<td width=\"115\">Cryptanlysis of AHS-AES Hash Structure<\/td>\n<td width=\"103\">. N. Bagheri, M. Naderi, B. Sadeghiyan, M. Safkhani<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Research Projects&#8221; tab_id=&#8221;1447500695536-5-7&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Research Projects<\/span><\/strong><\/h4>\n<table>\n<tbody>\n<tr>\n<td width=\"44\"><strong>Row<\/strong><\/td>\n<td width=\"164\"><strong>Title<\/strong><\/td>\n<td width=\"104\"><strong>Project Leader<\/strong><\/td>\n<td width=\"104\"><strong>Year <\/strong><\/td>\n<td width=\"104\"><strong>Employer<\/strong><\/td>\n<td width=\"104\"><strong>comments<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"44\">1<\/td>\n<td width=\"164\">Improvement of Anti-collision Protocols in RFID Systems<\/td>\n<td width=\"104\">Masoumeh Safkhani<\/td>\n<td width=\"104\">Summer 2015<\/td>\n<td width=\"104\">Shahid Rajaee Teacher Training University<\/td>\n<td width=\"104\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div><\/div>\n<p>[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Books&#8221; tab_id=&#8221;1446618295-2-17&#8243;][vc_column_text]<\/p>\n<div><\/div>\n<div><\/div>\n<h4 style=\"text-align: left !important;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Books<\/span><\/strong><\/h4>\n<div>\n<table id=\"grdData7\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\"><\/th>\n<th scope=\"col\">Book<\/th>\n<th scope=\"col\">TitleBook<\/th>\n<th scope=\"col\"><\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"49\"><strong>1<\/strong><\/td>\n<td width=\"249\">Hash Function: Principles &amp; Applications<\/td>\n<td width=\"152\">2008<\/td>\n<td width=\"174\">IranUniversity of science &amp; technology publications, No.447, 2008.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Teaching&#8221; tab_id=&#8221;1446620159472-2-0&#8243;][vc_column_text]<\/p>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Courses Taught<\/span><\/strong><\/h4>\n<div>\n<table id=\"grdData5\" border=\"1\" rules=\"all\" cellspacing=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\"><\/th>\n<th scope=\"col\">caption<\/th>\n<th scope=\"col\">Section<\/th>\n<th scope=\"col\">StartYear<\/th>\n<th scope=\"col\">EndYear<\/th>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td width=\"36\">1<\/td>\n<td width=\"182\">Computer Architecture<\/td>\n<td width=\"46\">BSc.<\/td>\n<td width=\"174\">Fall 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">2<\/td>\n<td width=\"182\">Computer Networks<\/td>\n<td width=\"46\">BSc.<\/td>\n<td width=\"174\">Fall 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">3<\/td>\n<td width=\"182\">Advanced Computer Networks<\/td>\n<td width=\"46\">MSc.&amp; Phd.<\/td>\n<td width=\"174\">Fall 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">4<\/td>\n<td width=\"182\">Computer Architecture Lab<\/td>\n<td width=\"46\">BSc.<\/td>\n<td width=\"174\">Fall 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">5<\/td>\n<td width=\"182\">Microprocessors I<\/td>\n<td width=\"46\">BSc.<\/td>\n<td width=\"174\">Spring 2015<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">6<\/td>\n<td width=\"182\">Microprocessors Lab<\/td>\n<td width=\"46\">BSc.<\/td>\n<td width=\"174\">Spring 2015<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">7<\/td>\n<td width=\"182\">Advanced Network Security<\/td>\n<td width=\"46\">MSc.&amp; Phd.<\/td>\n<td width=\"174\">Spring 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">8<\/td>\n<td width=\"182\">Cryptography<\/td>\n<td width=\"46\">MSc.&amp; Phd.<\/td>\n<td width=\"174\">Fall 2014<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<tr>\n<td width=\"36\">9<\/td>\n<td width=\"182\">Security Protocols<\/td>\n<td width=\"46\">MSc.&amp; Phd.<\/td>\n<td width=\"174\">Spring 2015<\/td>\n<td width=\"78\">Until now<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"center\"><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"center\"><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"left\"><\/td>\n<td align=\"center\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h4 style=\"text-align: left;\"><strong><span style=\"font-size: 20px; color: #126698 !important;\">Workshops<\/span><\/strong><\/h4>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"42\"><strong>Row<\/strong><\/td>\n<td width=\"180\"><strong>Title <\/strong><\/td>\n<td width=\"288\"><strong>Place<\/strong><\/td>\n<td width=\"114\"><strong>Date<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"42\">1<\/td>\n<td width=\"180\">Security Analysis of SNMP<\/td>\n<td width=\"288\">CyberSpace Research Institute<\/td>\n<td width=\"114\">Tehran, Jan. 2012.<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">2<\/td>\n<td width=\"180\">Introduction to RFID Systems<\/td>\n<td width=\"288\">Department of Electrical engineering, Guilan University<\/td>\n<td width=\"114\">Rasht, February 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">3<\/td>\n<td width=\"180\">Command and Control networks\u2019 Simulation with OPNET<\/td>\n<td width=\"288\">4th Conference of Iran&#8217;s Scientific Society of Command, Control, Communications, Computers and Intelligences(C4I),<\/td>\n<td width=\"114\">Department of Electrical engineering, Sharif University of Technology, Tehran, October 2010<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">4<\/td>\n<td width=\"180\">Introduction to OPNET Software<\/td>\n<td width=\"288\">3rd Conference of Iran&#8217;s Scientific Society of Command, Control, Communications, Computers and Intelligences(C4I),<\/td>\n<td width=\"114\">Department of Electrical engineering, Malek Ashtar University of Technology, Tehran, October 2009<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tab][\/vc_tabs][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1486448412372{border-left-width: 25px !important;padding-left: 15px !important;}&#8221;] dr. masoumeh safkhani Assistant professor Email:\u00a0Safkhani@sru.ac.ir tel:00982122970117 fax:00982122970117 Faculty of Computer Engineering Department of \u00a0Computer Systems Architecture [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1460800436555{border-right-width: 25px !important;padding-right: 15px !important;}&#8221;] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/1&#8243;][vc_tabs][vc_tab title=&#8221;Profile&#8221; tab_id=&#8221;1446618295-1-16&#8243;][vc_column_text] Research Interests: Caption 1 Design and Cryptanalysis of Security Protocols 2 Design and Cryptanalysis of Cryptography Primitives 3 RFID Security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"layouts\/fullwidth.php","meta":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/pages\/1430"}],"collection":[{"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/comments?post=1430"}],"version-history":[{"count":4,"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/pages\/1430\/revisions"}],"predecessor-version":[{"id":2162,"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/pages\/1430\/revisions\/2162"}],"wp:attachment":[{"href":"https:\/\/www.sru.ac.ir\/en\/wp-json\/wp\/v2\/media?parent=1430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}