172 results on '"Mashatan, Atefeh"'
Search Results
2. Controlled Quantum Teleportation in the Presence of an Adversary
3. Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks
4. Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture
5. Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment
6. Formal unlinkability analysis of message authentication protocols based on authentic channels
7. Secure multiparty quantum key agreement against collusive attacks
8. On Broadcasting Time in the Model of Travelling Agents
9. A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols
10. XMal: A lightweight memory-based explainable obfuscated-malware detector
11. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
12. Cybersecurity Considerations in Blockchain-Based Solutions
13. A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs
14. High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology
15. Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
16. Balancing Security: A Moving Target
17. Innovation within networks – patent strategies for blockchain technology
18. Preparing for the Information Security Threat from Quantum Computers
19. An Enterprise Transformation Guide for the Inevitable Blockchain Disruption
20. Cybersecurity Considerations in Blockchain-Based Solutions
21. On broadcasting time in the model of travelling agents
22. Optimization of the cost of urban traffic through an online bidding platform for commuters
23. Touching holograms with windows mixed reality: Renovating the consumer retailing services
24. Blockchain platform for industrial healthcare: Vision and future opportunities
25. Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction
26. PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing
27. Security improvements for privacy-preserving quantum multiparty computation based on circular structure
28. Secure multiparty quantum key agreement against collusive attacks
29. Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
30. What is driving consumer resistance to crypto‐payment? A multianalytical investigation.
31. Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things
32. Introducing technological disruption: how breaking media attention on corporate events impacts online sentiment
33. What is driving consumer resistance to crypto‐payment? A multianalytical investigation
34. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.
35. The Arrival of Zero Trust: What Does It Mean?
36. Introducing technological disruption: how breaking media attention on corporate events impacts online sentiment
37. Secure dynamic multiparty quantum private comparison
38. XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things
39. Formal unlinkability analysis of message authentication protocols based on authentic channels
40. The Complex Path to Quantum Resistance: Is your organization prepared?
41. Quantum-Safe Trust for Vehicles: The Race Is Already On.
42. Multiagent Routing Simulation with Partial Smart Vehicles Penetration
43. A Related-Key Attack against Multiple Encryption Based on Fixed Points
44. Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers
45. Resistance against Iterated Attacks by Decorrelation Revisited
46. Efficient Fail-Stop Signatures from the Factoring Assumption
47. Controlled quantum teleportation in the presence of an adversary
48. A Message Recognition Protocol Based on Standard Assumptions
49. A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
50. A New Message Recognition Protocol for Ad Hoc Pervasive Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.