Atefeh Mashatan
Orcid: 0000-0001-9448-9123
According to our database1,
Atefeh Mashatan
authored at least 62 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan.
ACM Queue, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Environmental Factors that Hinder an Organization's Ability to Learn from Cyber Incidents: A Case Study on SolarWinds.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
Understanding Adoption Intentions for Blockchain-based Personal Health Records: Integrating Technology Usage and Initial Trust Perspectives.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Comput. Secur., October, 2023
Formal unlinkability analysis of message authentication protocols based on authentic channels.
J. Supercomput., May, 2023
Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems.
CoRR, 2023
XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment.
Proceedings of the Augmented Cognition, 2023
Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture.
Proceedings of the Augmented Cognition, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.
J. Supercomput., 2022
From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology.
ACM Queue, 2022
Security improvements for privacy-preserving quantum multiparty computation based on circular structure.
Quantum Inf. Process., 2022
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives.
Internet Things, 2022
A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs.
Comput. Ind., 2022
Commun. Assoc. Inf. Syst., 2022
A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase.
Behav. Inf. Technol., 2022
How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study.
IEEE Access, 2022
Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment.
IEEE Access, 2022
2021
ACM Queue, 2021
J. Database Manag., 2021
Comput., 2021
Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions.
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
ACM Trans. Manag. Inf. Syst., 2020
Quantum Inf. Process., 2020
MIS Q. Executive, 2020
CoRR, 2020
Computer, 2020
Comput. Commun., 2020
Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization.
J. Inf. Secur. Appl., 2019
Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network.
IEEE Access, 2019
2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2014
Cryptogr. Commun., 2014
2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ISC Int. J. Inf. Secur., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
2010
Int. J. Appl. Cryptogr., 2010
Des. Codes Cryptogr., 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
PhD thesis, 2008
IACR Cryptol. ePrint Arch., 2008
2007
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions.
IET Inf. Secur., 2007
Interactive two-channel message authentication based on interactive-collision Resistant hash functions.
IACR Cryptol. ePrint Arch., 2007
2006
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
IACR Cryptol. ePrint Arch., 2006
2004
J. Comb. Theory A, 2004