Loading...
Search for: babaheidarian--parisa
0.122 seconds

    On the security of an ECC based RFID authentication protocol

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 111-114 ; 9781467323864 (ISBN) Babaheidarian, P ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
    2012
    Abstract
    Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication protocols known as EC-RAC family has been introduced. However, it has been shown that all the versions of EC-RAC protocols are exposed to privacy and/or security threats. In this paper we analyzed a version of the EC-RAC RFID authentication protocol as well as a version of Schnorr protocol which were presented in a recent work and are claimed to have the demanding requirements. We demonstrated an impersonation attack on the claimed improved EC-RAC, and consequently showed that it would not satisfy the tag authentication property. Also,... 

    Analysis of Key Agreement in Secure Networks from the View of Information Theory

    , M.Sc. Thesis Sharif University of Technology Babaheidarian, Parisa (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In this thesis the problem of simultaneously generating multiple keys among multiple terminals is investigated. After providing a survey on the related works and exploiting the problem of sharing a common secret key and a private key among three terminals, we introduce a new source model which we call it the Four-Terminal model. We consider the problem of generating three kinds of keys among legitimate terminals and investigate the problem under two different scenarios, Backward and Forward scenarios, which depend on the kind of restrictions imposed on the usage of the public channel. We derive an achievable region for the backward scenario, using the combination of superposition coding and... 

    Simultaneously generating multiple keys in a four-terminal network

    , Article IET Information Security ; Volume 6, Issue 3 , 2012 , Pages 190-201 ; 17518709 (ISSN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concealed from terminal 4 (the external wiretapper). The authors assume that all terminals including the external wiretapper have access to distinct correlated i.i.d. sources; there is also a noiseless public channel with unlimited capacity among the terminals. The authors have investigated the model on... 

    Experimental Study of Drying and Calcination of Simulated High-Level Waste (HLW)

    , M.Sc. Thesis Sharif University of Technology Farahzadi, Zahra (Author) ; Samadfam, Mohammad (Supervisor) ; Zahakifar, Fazel (Supervisor) ; Zaheri, Parisa (Co-Supervisor)
    Abstract
    One of the novel methods of stabilization of nuclear waste is the use of vitrification technology. In order to stabilize high level wastes (HLLW) in glass, it is required that the elements are in their oxide form. Therefore, it is necessary to evaporate the waste and turn it into a solid form so that the elements can be converted into oxide form in the calcination furnace. Hence, one of the challenges of stabilization is the optimization of evaporation and calcination conditions. In this research, the parameters affecting evaporation were first investigated. Using laboratory measurements of application: temperature (110 to 180 °C), presence of nitric acid (0.5 to 4 mol/L), ratio of zirconium... 

    The Study of Effective Parameters on Thorium Extraction by Cyanex 272 in an Emulsion Liquid Membrane System

    , M.Sc. Thesis Sharif University of Technology Ehyaie, Darya (Author) ; Samadfam, Mohammad (Supervisor) ; Zaheri, Parisa (Supervisor) ; Zahakifar, Fazel (Co-Supervisor)
    Abstract
    This study used the emulsion liquid membrane method to investigate the extraction and separation of thorium from nitrate solution. According to the results obtained from the studies, Cyanex 272 was a suitable option for selectively extracting thorium. For simultaneous extraction and stripping of thorium from dilute aqueous solutions, an emulsion liquid membrane system consisting of Cyanex 272 as an extractant, Span 80 as a surfactant and sulfuric acid solution as a receiving phase (internal phase) was used. Emulsion liquid membrane method has high mass transfer flux due to high surface to volume ratio, which causes high extraction efficiency and fast transfer of thorium ions from its low... 

    Fabrication Patient-Specific Drill Guide Templates for Cervical Pedicle Screw Placement

    , M.Sc. Thesis Sharif University of Technology Safahieh, Amir Hossein (Author) ; Arjmand, Navid (Supervisor) ; Parnianpour, Mohammad (Supervisor) ; Azimi, Parisa (Co-Supervisor)
    Abstract
    One of the most common spinal surgeries involves spinal fusion or vertebral fixation, which is used to treat various conditions such as intervertebral disc disease, scoliosis (lateral deviation of the spinal column), fractures, infections, or the presence of tumors in the spinal column. In this surgical procedure, the use of pedicle screws and titanium rods prevents motion and friction between two vertebrae. Screws may enter the vertebrae in the wrong position and angle, causing bone weakening, rupture of nerve roots or blood vessels, weakness or lack of sensation in some parts of the body, spinal cord injury, and in severe cases, paralysis of the patient. For this reason, fusion surgery is... 

    Investigation of Mass Transfer Coefficients in Lithium Liquid-Liquid Extraction Process in Batch and Continuous Modes (Microchannel)

    , M.Sc. Thesis Sharif University of Technology Bahadri, Mohammad Mehdi (Author) ; Otokesh, Mohammad (Supervisor) ; Amari Allahyari, Sareh (Supervisor) ; Zaheri, Parisa (Co-Supervisor)
    Abstract
    Lithium is a soft, silvery-white alkali metal that is recognized as the lightest metal and the least dense solid element. The increasing demand for lithium, driven by the global shift towards electrification and sustainable energy solutions, has transformed this material into a crucial resource in the modern economy. Lithium has applications in various industries, including the nuclear industry. 6Li is used for the production of tritium, and 7Li, in the form of 7LiOH, is used to adjust the pH in light water reactors and as an anti-corrosion compound in fission reactors. In this study, the extraction of lithium from the aqueous phase using a Y-shaped microchannel was carried out, and the mass... 

    A new secret key agreement scheme in a four-terminal network

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 151-154 ; 9781457707438 (ISBN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; IEEE; Canadian Society of Information Theory (CSIT); UBC; Faculty of Applied Science; RIM ; Sharif University of Technology
    2011
    Abstract
    A new scenario for simultaneously generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends to share a private key with Terminal 3 while keeping it concealed from each other and from Terminal 4. All four Terminals observe i.i.d. outputs of correlated sources and there is a public channel from Terminal 3 to Terminals 1 and 2. An inner bound of the secret key-private keys capacity region is derived and the single letter capacity regions are obtained for some...