Rasoul Ramezanian

Work place: Department of Mathematical Sciences, Ferdowsi University of Mashhad‎, Mashhad, ‎Iran

E-mail: rramezanian@um.ac.ir

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Systems Architecture, Network Security, Data Structures and Algorithms

Biography

Rasoul Ramezanian was born in Mashhad in 1979. He got his B.S. and M.S. in Mathematics. In 2008, he graduated from a Ph.D. program of Mathematical Science Department of Sharif University of Technology, Tehran, Iran. He is an assistant professor at the same department. His research interests include Formal method, Specifying and Verifying Security Protocols, Multi-Agent Systems, and Process Algebra.

Author Articles
A Note on Group Authentication Schemes

By Mohsen Pourpouneh Rasoul Ramezanian Afshin Zarei

DOI: https://doi.org/10.5815/ijcnis.2016.05.03, Pub. Date: 8 May 2016

In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every agents that has access to the group key is an eligible member. In this paper, we informally classify different group authentication schemes, based on how the agents authenticate each other and provide examples of each class. We then improve one of the well-known key establishment protocol to an authenticated version according so that it meets one of our notions of group authentication.

[...] Read more.
An Improvement over a Server-less‎ RFID Authentication Protocol

By Mohsen Pourpouneh Rasoul Ramezanian Fatemeh Salahi

DOI: https://doi.org/10.5815/ijcnis.2015.01.05, Pub. Date: 8 Dec. 2014

With the increased radio frequency identification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper we analyze the security of a server-less RFID authentication protocol which is proposed by Deng et al. in 2014. Deng et al. proposed an improvement over Hoque et al. protocol to overcome its vulnerability against data desynchronization attack. However, in this paper we show that their protocol is still vulnerable against data desynchronization attack. Furthermore we present an improved version of this protocol to prevent this attack.

[...] Read more.
Other Articles