Search

Your search keyword '"Mashatan, Atefeh"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Mashatan, Atefeh" Remove constraint Author: "Mashatan, Atefeh" Database Complementary Index Remove constraint Database: Complementary Index
33 results on '"Mashatan, Atefeh"'

Search Results

1. What is driving consumer resistance to crypto‐payment? A multianalytical investigation.

2. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.

3. The Arrival of Zero Trust: What Does It Mean?

4. The Complex Path to Quantum Resistance: Is your organization prepared?

5. Quantum-Safe Trust for Vehicles: The Race Is Already On.

6. Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan.

7. Formal unlinkability analysis of message authentication protocols based on authentic channels.

8. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.

9. Tightly Secure PKE Combiner in the Quantum Random Oracle Model.

10. A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase.

11. Distributed Renewable Energy Management: A Gap Analysis and Proposed Blockchain-Based Architecture.

12. On the Security of the Dandelion Protocol.

13. Security improvements for privacy-preserving quantum multiparty computation based on circular structure.

14. Innovation within networks – patent strategies for blockchain technology.

16. A Cross-Pollination of Ideas about Distributed Ledger Technological Innovation through a Multidisciplinary and Multisectoral Lens: Insights fromthe Blockchain Technology Symposium '21.

17. Secure multiparty quantum key agreement against collusive attacks.

18. Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology.

19. An Enterprise Transformation Guide for the Inevitable Blockchain Disruption.

20. Multiagent Routing Simulation with Partial Smart Vehicles Penetration.

22. Secure dynamic multiparty quantum private comparison.

23. Revisiting iterated attacks in the context of decorrelation theory.

27. A Message Recognition Protocol Based on Standard Assumptions.

28. A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.

29. A New Message Recognition Protocol for Ad Hoc Pervasive Networks.

30. QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems.

31. Practical unconditionally secure two-channel message authentication.

32. Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions.

33. Distributed Interoperable Records: The Key to Better Supply Chain Management.

Catalog

Books, media, physical & digital resources