Atefeh Mashatan

Orcid: 0000-0001-9448-9123

According to our database1, Atefeh Mashatan authored at least 62 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan.
ACM Queue, 2024

PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Environmental Factors that Hinder an Organization's Ability to Learn from Cyber Incidents: A Case Study on SolarWinds.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

Understanding Adoption Intentions for Blockchain-based Personal Health Records: Integrating Technology Usage and Initial Trust Perspectives.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
XMal: A lightweight memory-based explainable obfuscated-malware detector.
Comput. Secur., October, 2023

Formal unlinkability analysis of message authentication protocols based on authentic channels.
J. Supercomput., May, 2023

From Zero to 100.
Commun. ACM, February, 2023

Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems.
CoRR, 2023

XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment.
Proceedings of the Augmented Cognition, 2023

Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture.
Proceedings of the Augmented Cognition, 2023

Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.
J. Supercomput., 2022

The Arrival of Zero Trust: What Does it Mean?
ACM Queue, 2022

From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology.
ACM Queue, 2022

Security improvements for privacy-preserving quantum multiparty computation based on circular structure.
Quantum Inf. Process., 2022

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives.
Internet Things, 2022

Tightly Secure PKE Combiner in the Quantum Random Oracle Model.
Cryptogr., 2022

A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs.
Comput. Ind., 2022

Quantum Computing and IS - Harnessing the Opportunities of Emerging Technologies.
Commun. Assoc. Inf. Syst., 2022

A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase.
Behav. Inf. Technol., 2022

How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study.
IEEE Access, 2022

Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment.
IEEE Access, 2022

2021
The Complex Path to Quantum Resistance: Is your organization prepared?
ACM Queue, 2021

Quantum-safe Trust for Vehicles: The race is already on.
ACM Queue, 2021

Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology.
J. Database Manag., 2021

On broadcasting time in the model of travelling agents.
Discret. Appl. Math., 2021

Distributed Interoperable Records: The Key to Better Supply Chain Management.
Comput., 2021

The complex path to quantum resistance.
Commun. ACM, 2021

Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media.
ACM Trans. Manag. Inf. Syst., 2020

A review of quantum and hybrid quantum/classical blockchain protocols.
Quantum Inf. Process., 2020

Preparing for the Information Security Threat from Quantum Computers.
MIS Q. Executive, 2020

Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks.
CoRR, 2020

An Enterprise Transformation Guide for the Inevitable Blockchain Disruption.
Computer, 2020

Blockchain platform for industrial healthcare: Vision and future opportunities.
Comput. Commun., 2020

Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization.
J. Inf. Secur. Appl., 2019

Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network.
IEEE Access, 2019

2017
An Enhanced Real Estate Transaction Process Based on Blockchain Technology.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2014
Revisiting iterated attacks in the context of decorrelation theory.
Cryptogr. Commun., 2014

2012
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers.
Proceedings of the Progress in Cryptology, 2012

Resistance against Iterated Attacks by Decorrelation Revisited, .
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Forgery-resilience for digital signature schemes.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
QTRU: quaternionic version of the NTRU public-key cryptosystems.
ISC Int. J. Inf. Secur., 2011

Efficient Fail-Stop Signatures from the Factoring Assumption.
Proceedings of the Information Security, 14th International Conference, 2011

A Related-Key Attack against Multiple Encryption Based on Fixed Points.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2010
On message recognition protocols: recoverability and explicit confirmation.
Int. J. Appl. Cryptogr., 2010

Practical unconditionally secure two-channel message authentication.
Des. Codes Cryptogr., 2010

A Message Recognition Protocol Based on Standard Assumptions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
QTRU: A Lattice Attack Resistant Version of NTRU.
IACR Cryptol. ePrint Arch., 2009

A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Message Authentication and Recognition Protocols Using Two-Channel Cryptography.
PhD thesis, 2008

A New Message Recognition Protocol for Ad Hoc Pervasive Networks.
IACR Cryptol. ePrint Arch., 2008

Recognition in Ad Hoc Pervasive Networks.
IACR Cryptol. ePrint Arch., 2008

2007
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions.
IET Inf. Secur., 2007

Interactive two-channel message authentication based on interactive-collision Resistant hash functions.
IACR Cryptol. ePrint Arch., 2007

2006
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
IACR Cryptol. ePrint Arch., 2006

2004
Asymptotics of combinatorial structures with large smallest component.
J. Comb. Theory A, 2004


  Loading...