Loading...
Search for:
babvey--pouria
0.182 seconds
Distance Bounding Authentication Protocols in RFID Systems
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Ever-encreasing progress in the field of wireless communication has paved the way for utilisation based on radio frequency authentication systems. In recent years, ITU started the scenario of "Internet of Things". RFID systems have an exclusive role in development ofthis idea, since they can make it possible for things which have an ID to be identified automatically in a large scale. The necessity of identification and tracing people and things has caused the deployment of RFID technology. Onthe other hand, these systems communicate via a wireless channel to transmit data, therefore they are vulnerable to eavesdropping and interception. Thus, one of the most important issues in using such...
Algebraic Topology Metheds on Graph Coloring
, M.Sc. Thesis Sharif University of Technology ; Jafari, Amir (Supervisor)
Abstract
The aim of this thesis is to introduce some algebraic topologies methods and apply them on fining the chromatic number of some famous graphs and also hypergraphs. In the first part, we will use a mixture of two well-known technics, Tucker lemma and Discrete Morse theory to find an upper bound for the chromatic number of s-stable Kneser for some specific vector s. to find the sharper upper bound, we will deviate our strategy and use another approach by finding an edge-labeling and apply some theorems in POSET algebraic topology. In this way, we also find a connection between Young diagrams and the numbers of spheres in the box complex related to Kneser graphs and hypergraph. Actually, we can...
Security analysis of SKI protocol
, Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , pp. 199-203 ; ISBN: 9781479953837 ; Yajam, H. A ; Eghlidos, T ; Sharif University of Technology
2014
Abstract
A great number of authentication protocols used in several applications such as payment systems are inherently vulnerable against relay attacks. Distance bounding protocols provide practical solutions against such attacks; some of which are lightweight and implementable on cheap RFID tags. In recent years, numerous lightweight distance bounding protocols have been proposed; however, a few of them appeared to be resistant against the existing attacks up to the present. One of most well-known protocols in this field is the SKI protocol which has a security proof based on a non-standard strong assumption named Circular Keying. In this paper, we demonstrate that without this strong and...
Performance Assessment of PEM Fuel Cell in Extreme Conditions (Sub- Freezing Temperatures)
, M.Sc. Thesis Sharif University of Technology ; Rajabi Qhahnuyeh, Abbas (Supervisor) ; Ahmadi, Pouria (Supervisor)
Abstract
Fossil fuels provide the most needs of the world's energy, however, continues to lead to two key problems. The first problem is their limitation, and the second problem is the creation of serious environmental issues. Therefore, the need for renewable energy sources is felt more than ever.As an energy source, hydrogen is the lightest, most efficient and cleanest fuel. One of its unique properties is efficiency, the production of electricity by fuel cells through the electrochemical process, has far greater efficiency than of mechanical energy production from fossil fuels in internal combustion engines or energy production in thermal power plants. A fuel cell is a device that converts...