Work place: Department of Mathematical Sciences, Sharif University of Technology, Tehran, Iran
E-mail: m_pourpouneh@mehr.sharif.ir
Website:
Research Interests: Computational Mathematics, Computer systems and computational processes, Computational Learning Theory, Information Security, Network Security
Biography
Mohsen Pourpouneh was born in 1989 in Isfahan. He got his B.Sc. (2011) and M.Sc. (2013) in Computer Science, from Shahid Beheshti University and Tehran University, respectively. He started his career as a Ph.D. student at Sharif University of Technology, Tehran, Iran in 2013. His research interest includes Formal method, Specifying and Verifying Security Protocols, Computational Number Theory, Electronic Voting.
By Mohsen Pourpouneh Rasoul Ramezanian Afshin Zarei
DOI: https://doi.org/10.5815/ijcnis.2016.05.03, Pub. Date: 8 May 2016
In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every agents that has access to the group key is an eligible member. In this paper, we informally classify different group authentication schemes, based on how the agents authenticate each other and provide examples of each class. We then improve one of the well-known key establishment protocol to an authenticated version according so that it meets one of our notions of group authentication.
[...] Read more.By Mohsen Pourpouneh Rasoul Ramezanian Fatemeh Salahi
DOI: https://doi.org/10.5815/ijcnis.2015.01.05, Pub. Date: 8 Dec. 2014
With the increased radio frequency identification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper we analyze the security of a server-less RFID authentication protocol which is proposed by Deng et al. in 2014. Deng et al. proposed an improvement over Hoque et al. protocol to overcome its vulnerability against data desynchronization attack. However, in this paper we show that their protocol is still vulnerable against data desynchronization attack. Furthermore we present an improved version of this protocol to prevent this attack.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals