default search action
Atefeh Mashatan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Nigel P. Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, Atefeh Mashatan:
Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan. ACM Queue 21(6): 78-100 (2024) - [c23]Dane Vanderkooi, Mohamad Sadegh Sangari, Atefeh Mashatan:
Understanding Adoption Intentions for Blockchain-based Personal Health Records: Integrating Technology Usage and Initial Trust Perspectives. AMCIS 2024 - [c22]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability. CPSS@AsiaCCS 2024: 16-23 - [c21]Burcu Bulgurcu, Nadège Levallet, Atefeh Mashatan:
Implications of Organizational Governance on Cybersecurity Management: A Qualitative Study in Higher Education. ECIS 2024 - [c20]Burcu Bulgurcu, Atefeh Atty Mashatan:
Environmental Factors that Hinder an Organization's Ability to Learn from Cyber Incidents: A Case Study on SolarWinds. HICSS 2024: 7397-7406 - [c19]Dane Vanderkooi, Atefeh Mashatan:
Do Privacy Concerns Matter? How Privacy Perceptions and Brand Trust Drive Smartphone Continual Usage Intentions. ICIS 2024 - [c18]Brian Goncalves, Atefeh Mashatan:
Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction. ICISSP 2024: 594-608 - [c17]Fatema Rashid, Ali Miri, Atefeh Mashatan:
PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing. ICISSP 2024: 838-844 - 2023
- [j36]Matthew Bush, Atefeh Mashatan:
From Zero to 100. Commun. ACM 66(2): 48-55 (2023) - [j35]Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan:
The Arrival of Zero Trust: What Does it Mean? Commun. ACM 66(2): 56-62 (2023) - [j34]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
XMal: A lightweight memory-based explainable obfuscated-malware detector. Comput. Secur. 133: 103409 (2023) - [j33]Mahdi R. Alagheband, Atefeh Mashatan:
Formal unlinkability analysis of message authentication protocols based on authentic channels. J. Supercomput. 79(7): 8097-8123 (2023) - [c16]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks. ACNS Workshops 2023: 642-656 - [c15]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things. DASC/PiCom/CBDCom/CyberSciTech 2023: 609-614 - [c14]Victoria Granova, Atefeh Mashatan, Ozgur Turetken:
Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture. HCI (9) 2023: 416-428 - [c13]Dane Vanderkooi, Mohamad Sadegh Sangari, Atefeh Mashatan:
Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment. HCI (9) 2023: 472-490 - [c12]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things. ICISSP 2023: 144-151 - [i9]Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems. CoRR abs/2310.00070 (2023) - 2022
- [j32]Atefeh Mashatan, Mohamad Sadegh Sangari, Milad Dehghani:
How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study. IEEE Access 10: 69441-69454 (2022) - [j31]Hussein Abulkasim, Brian Goncalves, Atefeh Mashatan, Shohini Ghose:
Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment. IEEE Access 10: 94963-94972 (2022) - [j30]Milad Dehghani, Fulya Acikgoz, Atefeh Mashatan, Seung Hwan Mark Lee:
A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase. Behav. Inf. Technol. 41(7): 1453-1471 (2022) - [j29]Wallace Chipidza, Yan Li, Atefeh Mashatan, Ozgur Turetken, Lorne Olfman:
Quantum Computing and IS - Harnessing the Opportunities of Emerging Technologies. Commun. Assoc. Inf. Syst. 52: 7 (2022) - [j28]Mohamad Sadegh Sangari, Atefeh Mashatan:
A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs. Comput. Ind. 143: 103769 (2022) - [j27]Brian Goncalves, Atefeh Mashatan:
Tightly Secure PKE Combiner in the Quantum Random Oracle Model. Cryptogr. 6(2): 15 (2022) - [j26]Mahdi R. Alagheband, Atefeh Mashatan:
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives. Internet Things 18: 100492 (2022) - [j25]Hussein Abulkasim, Atefeh Mashatan, Shohini Ghose:
Security improvements for privacy-preserving quantum multiparty computation based on circular structure. Quantum Inf. Process. 21(1): 25 (2022) - [j24]Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan:
The Arrival of Zero Trust: What Does it Mean? ACM Queue 20(4): 61-79 (2022) - [j23]Matthew Bush, Atefeh Mashatan:
From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology. ACM Queue 20(4): 80-106 (2022) - [j22]Mahdi R. Alagheband, Atefeh Mashatan:
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. J. Supercomput. 78(17): 18777-18824 (2022) - 2021
- [j21]Atefeh Mashatan, Douglas Heintzman:
The complex path to quantum resistance. Commun. ACM 64(9): 46-53 (2021) - [j20]Michael Gardiner, Alexander Truskovsky, George V. Neville-Neil, Atefeh Mashatan:
Quantum-safe trust for vehicles: the race is already on. Commun. ACM 64(9): 54-61 (2021) - [j19]Annegret Henninger, Atefeh Mashatan:
Distributed Interoperable Records: The Key to Better Supply Chain Management. Comput. 10(7): 89 (2021) - [j18]Reaz Huq, Bogumil Kaminski, Atefeh Mashatan, Pawel Pralat, Przemyslaw Szufel:
On broadcasting time in the model of travelling agents. Discret. Appl. Math. 291: 246-263 (2021) - [j17]Atefeh Mashatan, Victoria L. Lemieux, Seung Hwan Mark Lee, Przemyslaw Szufel, Zachary Roberts:
Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology. J. Database Manag. 32(1): 27-48 (2021) - [j16]Atefeh Mashatan, Douglas Heintzman:
The Complex Path to Quantum Resistance: Is your organization prepared? ACM Queue 19(2): 65-92 (2021) - [j15]Michael Gardiner, Alexander Truskovsky, George V. Neville-Neil, Atefeh Mashatan:
Quantum-safe Trust for Vehicles: The race is already on. ACM Queue 19(2): 93-115 (2021) - [c11]M. Mahdi Roghanizad, Ellen Choi, Atefeh Atty Mashatan, Ozgur Turetken:
Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions. AMCIS 2021 - 2020
- [j14]Ahmed Farouk, Amal Alahmadi, Shohini Ghose, Atefeh Mashatan:
Blockchain platform for industrial healthcare: Vision and future opportunities. Comput. Commun. 154: 223-235 (2020) - [j13]Mehmet Demir, Ozgur Turetken, Atefeh Mashatan:
An Enterprise Transformation Guide for the Inevitable Blockchain Disruption. Computer 53(6): 34-43 (2020) - [j12]Atefeh Mashatan, Ozgur Turetken:
Preparing for the Information Security Threat from Quantum Computers. MIS Q. Executive 19(2): 7 (2020) - [j11]Marcus Edwards, Atefeh Mashatan, Shohini Ghose:
A review of quantum and hybrid quantum/classical blockchain protocols. Quantum Inf. Process. 19(6): 184 (2020) - [j10]Mahdi R. Alagheband, Atefeh Mashatan, Morteza Zihayat:
Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media. ACM Trans. Manag. Inf. Syst. 11(4): 20:1-20:20 (2020) - [c10]Anatoliy A. Gruzd, Deena Abul-Fottouh, Atefeh Mashatan:
Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations. HICSS 2020: 1-10 - [i8]Reaz Huq, Bogumil Kaminski, Atefeh Mashatan, Pawel Pralat, Przemyslaw Szufel:
On Broadcasting Time in the Model of Travelling Agents. CoRR abs/2003.08501 (2020) - [i7]Hussein Abulkasim, Atefeh Mashatan, Shohini Ghose:
Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks. CoRR abs/2004.11738 (2020)
2010 – 2019
- 2019
- [j9]Hussein Abulkasim, Hanan Alsuqaih, Walaa Hamdan, Safwat H. Hamad, Ahmed Farouk, Atefeh Mashatan, Shohini Ghose:
Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network. IEEE Access 7: 17917-17926 (2019) - [j8]Kyrylo Petrenko, Atefeh Mashatan, Farid Shirazi:
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. J. Inf. Secur. Appl. 46: 151-163 (2019) - [e1]Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0 [contents] - [i6]Marcus Edwards, Atefeh Mashatan, Shohini Ghose:
A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols. CoRR abs/1912.09280 (2019) - 2017
- [c9]Atefeh Mashatan, Zachary Roberts:
An Enhanced Real Estate Transaction Process Based on Blockchain Technology. AMCIS 2017 - 2014
- [j7]Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Revisiting iterated attacks in the context of decorrelation theory. Cryptogr. Commun. 6(4): 279-311 (2014) - 2012
- [c8]Atefeh Mashatan, Khaled Ouafi:
Forgery-resilience for digital signature schemes. AsiaCCS 2012: 24-25 - [c7]Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Resistance against Iterated Attacks by Decorrelation Revisited, . CRYPTO 2012: 741-757 - [c6]Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers. INDOCRYPT 2012: 528-544 - 2011
- [j6]Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan:
QTRU: quaternionic version of the NTRU public-key cryptosystems. ISC Int. J. Inf. Secur. 3(1): 29-42 (2011) - [c5]Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
A Related-Key Attack against Multiple Encryption Based on Fixed Points. ICETE (Selected Papers) 2011: 264-280 - [c4]Atefeh Mashatan, Khaled Ouafi:
Efficient Fail-Stop Signatures from the Factoring Assumption. ISC 2011: 372-385 - 2010
- [j5]Atefeh Mashatan, Douglas R. Stinson:
Practical unconditionally secure two-channel message authentication. Des. Codes Cryptogr. 55(2-3): 169-188 (2010) - [j4]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
On message recognition protocols: recoverability and explicit confirmation. Int. J. Appl. Cryptogr. 2(2): 100-120 (2010) - [c3]Atefeh Mashatan, Serge Vaudenay:
A Message Recognition Protocol Based on Standard Assumptions. ACNS 2010: 384-401
2000 – 2009
- 2009
- [j3]Atefeh Mashatan, Douglas R. Stinson:
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. Int. J. Inf. Sec. 8(1): 49-60 (2009) - [c2]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. ACNS 2009: 219-237 - [i5]Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan:
QTRU: A Lattice Attack Resistant Version of NTRU. IACR Cryptol. ePrint Arch. 2009: 386 (2009) - 2008
- [b1]Atefeh Mashatan:
Message Authentication and Recognition Protocols Using Two-Channel Cryptography. University of Waterloo, Ontario, Canada, 2008 - [c1]Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol for Ad Hoc Pervasive Networks. CANS 2008: 378-394 - [i4]Atefeh Mashatan, Douglas R. Stinson:
Recognition in Ad Hoc Pervasive Networks. IACR Cryptol. ePrint Arch. 2008: 239 (2008) - [i3]Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol for Ad Hoc Pervasive Networks. IACR Cryptol. ePrint Arch. 2008: 294 (2008) - 2007
- [j2]Atefeh Mashatan, Douglas R. Stinson:
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions. IET Inf. Secur. 1(3): 111-118 (2007) - [i2]Atefeh Mashatan, Douglas R. Stinson:
Interactive two-channel message authentication based on interactive-collision Resistant hash functions. IACR Cryptol. ePrint Arch. 2007: 12 (2007) - 2006
- [i1]Atefeh Mashatan, Douglas R. Stinson:
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. IACR Cryptol. ePrint Arch. 2006: 302 (2006) - 2004
- [j1]Edward A. Bender, Atefeh Mashatan, Daniel Panario, L. Bruce Richmond:
Asymptotics of combinatorial structures with large smallest component. J. Comb. Theory A 107(1): 117-125 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint