Babak Sadeghian

Learn More
Nowadays, one of the main challenges facing computer systems is increasing attacks and security threats against them. Therefore, capturing, analyzing, designing, developing and testing of security requirements have became an important issue in development of security-critical computing systems, such as banking, military and e-commerce systems. For(More)
BACKGROUND This study aimed to assess the relationship of air pollution and plasma surrogate markers of endothelial dysfunction in the pediatric age group. METHODS This cross-sectional study was conducted in 2009-2010 among 125 participants aged 10-18 years. They were randomly selected from different areas of Isfahan city, the second large and(More)
BACKGROUND This study aimed to determine the association of ambient particulate matter (PM) on surrogate markers of endothelial function and inflammation in healthy children with or without exposure to second-hand smoke. METHODS This cross-sectional study was conducted in 2011 in Isfahan, which is the second largest and second most air-polluted city in(More)
Intrusion detection systems are designed based on the assumption that the behavior of an intruder is different from a normal user of a system. We show that intrusion detection can be done based on the assumption that the correlation of system events and parameters is changed during an attack to the system. In this paper, we propose a new method in(More)
OBJECTIVES Air pollution is a hazardous environmental problem with several adverse health effects including its impact on the development of chronic diseases as diabetes mellitus. This study aimed to investigate the association of geographical distribution of air quality index (AQI) and type 2 diabetes mellitus in an air-polluted city by using geographic(More)
The world is moving rapidly toward the deployment of information and communication systems. Nowadays, computing systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important(More)
Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show its application we combine ternary difference approach with conventional differential cryptanalysis and apply that to cryptanalysis the reduced round PRESENT. We also use ant colony(More)
Asynchronous designs have the potential to be robust with respect to changes in the physical environment. They also appear to consume less power and provide better performance compared to their synchronous counterparts. In this work, synchronous and asynchronous implementations of the modular multiplication that is the major part of the RSA algorithm is(More)
Reconfigurable computing has grown to become an important and large field of research. It offers advantages over traditional hardware and software implementation of computational algorithms. In this paper, we implemented multiple cryptographic algorithms, namely DES, LOKI, DESX, Biham-DES, and SDES on a reconfigurable hardware. Our implementation results in(More)