135 results on '"Mashatan, Atefeh"'
Search Results
2. Controlled Quantum Teleportation in the Presence of an Adversary
3. Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks
4. Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture
5. Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment
6. Formal unlinkability analysis of message authentication protocols based on authentic channels
7. Secure multiparty quantum key agreement against collusive attacks
8. On Broadcasting Time in the Model of Travelling Agents
9. A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols
10. XMal: A lightweight memory-based explainable obfuscated-malware detector
11. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
12. Cybersecurity Considerations in Blockchain-Based Solutions
13. A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs
14. High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology
15. Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
16. Balancing Security: A Moving Target
17. Innovation within networks – patent strategies for blockchain technology
18. Preparing for the Information Security Threat from Quantum Computers
19. An Enterprise Transformation Guide for the Inevitable Blockchain Disruption
20. Cybersecurity Considerations in Blockchain-Based Solutions
21. On broadcasting time in the model of travelling agents
22. Optimization of the cost of urban traffic through an online bidding platform for commuters
23. Touching holograms with windows mixed reality: Renovating the consumer retailing services
24. Blockchain platform for industrial healthcare: Vision and future opportunities
25. Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction
26. PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing
27. Security improvements for privacy-preserving quantum multiparty computation based on circular structure
28. Secure multiparty quantum key agreement against collusive attacks
29. Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
30. What is driving consumer resistance to crypto‐payment? A multianalytical investigation.
31. Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things
32. Introducing technological disruption: how breaking media attention on corporate events impacts online sentiment
33. What is driving consumer resistance to crypto‐payment? A multianalytical investigation
34. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.
35. The Arrival of Zero Trust: What Does It Mean?
36. Introducing technological disruption: how breaking media attention on corporate events impacts online sentiment
37. Secure dynamic multiparty quantum private comparison
38. XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things
39. Formal unlinkability analysis of message authentication protocols based on authentic channels
40. The Complex Path to Quantum Resistance: Is your organization prepared?
41. Quantum-Safe Trust for Vehicles: The Race Is Already On.
42. Multiagent Routing Simulation with Partial Smart Vehicles Penetration
43. Controlled quantum teleportation in the presence of an adversary
44. Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan.
45. The Arrival of Zero Trust: What Does it Mean?
46. From Zero to One Hundred
47. Distributed Renewable Energy Management: A Gap Analysis and Proposed Blockchain-Based Architecture
48. Tightly Secure PKE Combiner in the Quantum Random Oracle Model
49. On the Security of the Dandelion Protocol
50. Revisiting iterated attacks in the context of decorrelation theory
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.