Dr. Atefeh (Atty) Mashatan is the founder and director of the Cybersecurity Research Lab (CRL) at Ryerson University and recognized as a leading expert in cryptography, blockchain technology, quantum-resistant solutions, enterprise security architecture and Internet-of-Things (IoT) security.
Professor Mashatan is holding a Canada Research Chair (Tier II) in Quality of Security (QoS) Framework for Internet-of-Things (IoT). She will address new threats that have arisen with the widespread adoption of IoT, create new security systems for these networks, and recommend best practices for users, technical audiences and policy-makers. Her CRC program is about enhancing the quality of security of smart yet small IoT devices in the specific context in which they are being deployed. The aim of this multidisciplinary research program is to make a solution as secure as possible, given the contextual parameters and limitations of its use-case.
Mashatan’s expertise at the frontlines of the global cybersecurity field was recognized by SC Magazine in 2019, when she was named one of the top five Women of Influence in Security. She was recognized as one of Canada’s Top 19 of 2019 Tech Titans at IBM CASCON Evoke conference for her efforts in developing emerging technological solutions to address timely societal needs. In 2020, she received the Enterprise Blockchain Award in the category of New Frontiers in Blockchain Academic Research by Blockchain Research Institute for developing the Mosaïque Digital Wallet, which is a fully decentralized identity management system for business environments. Most recently, she received the recognition of Top Women in Cybersecurity in Canada for her efforts in advancing cybersecurity research and training highly qualified personnel in the field.
Through strategic collaborations with government and industry, Mashatan and the CRL seek to spearhead crucial, ongoing dialogue with the Information and Computer Technology (ICT) industry in Canada, and to help solve industry problems through cutting edge information security and research into cyber risk mitigation strategies and solutions. Previously, Mashatan was a Scientific Collaborator at the Security and Cryptography Laboratory of School of Computer and Communication Sciences, EPFL (Swiss Federal Institute of Technology, Lausanne), where she conducted research into cryptographic protocols, followed by a position at CIBC, where she was a Senior Information Security Consultant and Solutions Architect focusing on cryptography and enterprise architecture.
Since 2016, Mashatan has been a professor of information technology management at Ryerson where she is training the next generation of cybersecurity experts. Mashatan serves on the board of directors at Compute Ontario, a consortia which serves to drive the province’s capacity in advanced research computing and big data; and on the board of the Rogers Cybersecure Catalyst, which is dedicated to solving critical cybersecurity challenges, accelerating Canadian cyber technologies and creating new opportunities for Canadian workers and entrepreneurs. As of recently, she has joined the Core Group at the National Research Council of Canada (NRC), who will focus on the Canadian challenges that will arise over the next 10 to 15 years through six areas of critical importance, including cybersecurity and privacy.
Her research has been supported by numerous industry partners as well as agencies such as the Natural Sciences and Engineering Research Council of Canada, the Social Sciences and Humanities Research Council of Canada and the Ontario Centres of Excellence. She is a Certified Service Oriented Architect (SOA) with Honours and holds a Certified Information Systems Security Professional (CISSP) certification from the International Information Systems Security Certification Consortium (ISC2).
Dr. Mashatan has an Erdős Number of 2!, external link This is the best a researcher can achieve since 1996 when Paul Erdős passed away.
Security of Internet of Things (IoT), Privacy enhancing technologies, Information Technology Security & Management, Big data and data security, Cryptographic Protocols, Postquantum Cryptography, Security in Ad Hoc Pervasive Networks.
|Refereed Journal Articles|
|M. Gardiner, A.Truskovsky, G. Neville-Neil, & A. Mashatan, “Quantum-safe Trust for Vehicles: The race is already on” ACM Queue Volume 19, Issue 2. pp 93–115. April 2021. (Accepted to Communications of the ACM, IF: 6.988 and Ranked A in ABDC Ranking, Q1 in Computer Science, Theory & Methods)|
|A. Mashatan & D.Heintzman, “The Complex Path to Quantum Resistance: Is your organization prepared?” ACM Queue Volume 19, Issue 2. pp 65–92. April 2021. (Accepted to Communications of the ACM, IF: 6.988 and Ranked A in ABDC Ranking, Q1 in Computer Science, Theory & Methods)|
|H. Abulkasim, A. Mashatan, and S. Ghose, “Secure multiparty quantum key agreement against collusive attacks”. Scientific Reports Volume 11, Issue 1. 11pp. May 4th, 2021. (IF: 3.998 and Q1 in Multidisciplinary Sciences)|
|H. Abulkasim, A. Mashatan, and S. Ghose, “Quantum-based Privacy-Preserving Sealed-bid Auction on the Blockchain.” Optik: International Journal for Light and Electron. 14 pp. April 30, 2021 (IF: 2.187).|
|J. Filipowski, B. Kamiński, A. Mashatan, P. Prałat, and P. Szufel, “Optimization of the cost of urban traffic through an online bidding platform for commuters.” Economics of Transportation, Volume 25. 17 pp. March 21, 2021 (IF: 1.654).|
|R. Huq, B. Kamiński, A. Mashatan, P. Prałat, and P. Szufel, “On Broadcasting Time in the Model of Travelling Agents,” Discrete Applied Mathematics, vol. 291, pp. 246-263, March 11, 2021. (IF: 1.041)|
|F Acikgoz, M. Dehghani, H. S. Lee, and A. Mashatan, “A Holistic Analysis towards Understanding Consumer Perceptions of Virtual Reality Devices in the Post-adoption Phase.” Behaviour & Information Technology, pp. 1-39, January 25, 2021. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 1.781)|
|A. Mashatan, M. Lee, V. Lemieux, and Z. Roberts, “Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology,” Journal of Database Management, pp. 27-48. January 1, 2021. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 1.138)|
|M. Dehghani, H. S. Lee, and A. Mashatan, “Touching Holograms with Windows Mixed Reality: Renovating the Consumer Retailing Services,” Technology in Society, vol. 63, pp. 1-23, November 2020. (IF: 2.414 and Q1 in Social Issues)|
|M. Edwards, A. Mashatan, and S. Ghose, “A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols,” Quantum Information Processing, vol. 19, no. 184, pp. 1-22, May 11, 2020. (Q1 in Theoretical Computer Science and IF: 2.433)|
|M. R. Alagheband, A. Mashatan, and M. Zihayat, “Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media,” ACM Transactions on Management Information Systems, vol. 11, no. 4. (Special Issue on Analytics for Cybersecurity and Privacy), pp. 1-21, October 22, 2020. (IF: 2.667)|
|A. Mashatan, M. Lee, V. Lemieux, and Z. Roberts, “Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology,” Journal of Database Management. (Forthcoming. 34 pages. Submission: May 29, 2019. Acceptance: April 12, 2020, IF: 1.138)|
|A. Farouk, A. Alahmadi, S.Ghose, and A. Mashatan. “Blockchain platform for industrial healthcare: Vision and future opportunities,” Computer Communications, vol. 154, pp. 223-235, March 15, 2020. (IF: 2.816)|
|B. Kamiński, L. Kraiński, A. Mashatan, P. Prałat, and P. Szufel, “Multiagent Routing Simulation with Partial Smart Vehicles Penetration,” Journal of Advanced Transportation, vol. 2020, pp. 1-11, March 3, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 1.670)|
|M. Demir, O. Turetken, and A. Mashatan, “An Enterprise Transformation Guide for the Inevitable Blockchain Disruption,” IEEE Computer, vol. 53, no. 6, pp. 34-43, June 2020. (IF: 4.419)|
A. Mashatan and O. Turetken, “Preparing for the Information Security Threat from Quantum Computers,” MIS Quarterly Executive, vol. 19, no. 2, pp. 157 - 164, May 31, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 4.088 and Q1 in Management and Information Science)
|H. Abulkasim, A. Farouk, S. Hamad, A. Mashatan, and S. Ghose, “Secure dynamic multiparty quantum private comparison,” Scientific Reports, vol. 9, no. 17818, pp. 1-16, November 28, 2019. (IF: 3.998 and Q1 in Multidisciplinary Sciences)|
|M. Dehghani, A. Mashatan, and R. W. Kennedy, “Innovation within networks – patent strategies for blockchain technology,” Journal of Business & Industrial Marketing, vol. ahead-of-print, no. ahead-of-print, February 14, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 2.497)|
H. Abulkasim, H. Alsuqaih, W. Hamdan, S. Hamad, A. Farouk, A. Mashatan, and S. Ghose, “Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network,” IEEE Access, vol. 7, pp. 17917-17926, January 21, 2019. (IF: 3.745 and Q1 in Computer Science, Information Systems)
|K. Petrenko, A. Mashatan, and F. Shirazi, “Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization,” Journal of Information Security and Applications, vol. 46, pp. 151-163, June 2019. (IF: 2.327)|
A. Bay, A. Mashatan, and S. Vaudenay, “Revisiting iterated attacks in the context of decorrelation theory,” Cryptography and Communications, vol. 6, no. 4, pp. 279-311, December 2014.(IF: 1.291)
E. Malekian, A. Mashatan, and A. Zakerolhosseini, “QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems,” The ISC International Journal of Information Security, vol. 3, no. 1, pp. 29-42, January 2011.
A. Mashatan and D. R. Stinson, “Practical unconditionally secure two-channel message authentication,” Designs, Codes and Cryptography, vol. 55, no. 2-3, pp. 169-188, May 2010.
I. Goldberg, A. Mashatan, and D. R. Stinson, “On message recognition protocols: recoverability and explicit confirmation,” International Journal of Applied Cryptography, vol. 2, no. 2, pp. 100-120, January 2010.
|A. Mashatan and D. R. Stinson, “Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions,” International Journal of Information Security, vol. 8, no. 1, pp. 49-60, February 2009. (IF: 1.494)|
|A. Mashatan and D. R. Stinson, “Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions,” IET Information Security, vol. 1, no. 3, pp. 111-118, September 2007. (IF: 1.068)|
|Refereed Conference Proceedings|
|M.S. Sangari and A. Mashatan. “Blockchain-enabled Supply Chain for Building Resilience Through Exploitation and Exploration: How do Supply Chain Contingencies Affect Adoption Outcomes?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.|
|M.S. Sangari and A. Mashatan. “Towards a Predictive Model of Blockchain-based Medical Records Adoption: How do Technology Readiness and Initial Trust Affect Behavioral Intentions?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.|
|B. Kaminski, L. Kraiński, A. Mashatan, P. Pralat, and P. Szufel. “Multi-agent routing simulation with partial smart vehicles penetration” in Proc. Transp. Sci. & Logistics (TSL) 2nd Triennial Conf., May 27-29, 2020.|
|A. Gruzd, D. Abul-Fottouh, and A. Mashatan, “Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations” in Proc. 2020 HICSS Conf., (Grand Wailea, HI, USA), January 7, 2020.|
|M. Demir, A. Mashatan, O. Turetken, and A. Ferworn, “Utility Blockchain for Transparent Disaster Recovery” in Proc. 2018 IEEE Elec. Power and Energy Conf. (EPEC), (Toronto, ON, Canada), January 3, 2019, pp. 1-6.|
|A. Mashatan and Z. Roberts, “An Enhanced Real Estate Transaction Process Based on Blockchain Technology” in Proc. 23rd Americas Conf. Info. Sys. (AMCIS), (Boston, MA, USA), May 17, 2017, pp. 11-17.|
|A. Mashatan and S. Vaudenay, “Fully Dynamic Universal Accumulators” in Proc. Romanian Crypto. Conf., (Bucharest, Romania), January 2013, pp. 269-285.|
|A. Bay, A. Mashatan, and S. Vaudenay, “Resistance Against Iterated Attacks by Decorrelation Theory, Revisited” in Proc. CRYPTO, (Santa Barba, CA, USA), August 2012, pp. 741-757.|
|A. Bay, A. Mashatan, and S. Vaudenay, “Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers” in Proc. INDOCRYPT, (New Delhi, India), December 2012, pp. 528-544.|
|A. Mashatan and K. Ouafi, “Forgery-Resilience for Digital Signature Schemes: A new paradigm for practical digital signature schemes exhibiting desirable legislative properties” in Proc. 7th ACM Symp. Inf., Comput. and Comm. Security, AsiaCCS, (Seoul, South Korea), May 2012, pp. 24-46.|
|A. Mashatan and K. Ouafi, “Efficient Fail-Stop Signatures from the Factoring Assumption” in Proc. 14th Inf. Sec. Conf. (ISC 2011), (Xi’an, China), October 2011, pp. 372-385.|
|A. Mashatan and S. Vaudenay, “A Message Recognition Protocol Based on Standard Assumptions” in Jianying Zhou and Moti Yung (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Beijing, China), June 2010, pp. 384-401.|
|I. Goldberg, A. Mashatan, and D. R. Stinson, “A new message recognition protocol with self-recoverability for ad hoc pervasive networks” in Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, and Damien Vergnaud (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Paris-Rocquencourt, France), May 2009, pp. 219-237.|
|A. Mashatan and D. R. Stinson, “A new message recognition protocol for ad hoc pervasive networks” in M. K. Franklin, L. C. K. Hui and D. S. Wong (Eds.), in Proc. Crypto. and Net. Sec.,7th Int. Conf. (CANS), (Hong-Kong, China), December 2008, pp. 378-394.|
|Patents and Invention Disclosures|
|Mosaïque: A Fully Decentralized and Data-driven Identity and Credential Management System for Business Environments by D. McKay and A. Mashatan. (2020, May 3).|
|Quantum-Resistant Augmented Key/Data Encapsulation Mechanism Encryption Algorithm (QUAKE) by B. Goncalvez and A. Mashatan. (2019, Jan. 25).|
|Method and apparatus for providing efficient management of certificate revocation by A. Mashatan, I. Aad, S. Vaudenay, P. V. Niemi, and R. Chaabouni. (2015). US 9083535 B2 [Online] Available: , external linkhttps://patentswarm.com/patents/US9083535B2, external link|
Atefeh Mashatan and Serge Vaudenay (2013), Fully Dynamic Universal Accumulators. Proceedings of the Romanian Academy, vol. 14: 269-285.
Jean-Philippe Aumasson, Atefeh Mashatan, and Willi Meier (2009), More on Shabal’s permutation. Official Comment - NIST Hash Competition.
Atefeh Mashatan (2008), Do student ratings of mathematics professors in research universities tend to discriminate against female instructors? 19 pages. This paper was a research project and a requirement for Certificate In University Teaching, Centre for Teaching Excellence, Waterloo, Ontario.
|Course Code||Course Title|
Directed Reading: User Acceptability of cryptocurrencies using Twitter data
Directed Readings: Quantum Computing Threat to Information and Communication Technologies
Directed Reading: Intellectual Property and Blockchain Technology Innovations
- Cryptography and Security
- Advanced Security
- Introduction to Graph Theory
- Math Discovery and Innovation
- Applied Cryptography
- Calculus II for Engineers
- Math of Public-Key Cryptography
- Discrete Math for Engineers
- Combinatorial Enumeration
- Introduction to Combinatorics
|Grant or Project Title||Year||Amount|
|Co-Principal Investigator - SSHRC Insight Grant, “Towards a Cyber-resilient Workforce - Cybersecurity Challenges, Awareness, and Training in the Age of COVID-19”||2021-2022||$50,000|
|Principal Investigator - SSHRC Insight Grant, “Determinants of distributed ledger technologies for open innovation: An exploratory investigation”||2021-2022||$73,450|
|Principal Investigator - Canada Research Chair, Tier II, “Quality of Security (QoSec) Framework for Internet-of-Things (IoT)”||
|Principal Investigator - Smart Computing for Innovation (SOSCIP0, “Security Analysis of POLARIS”||2020-2021||Non-funded Grant|
|Principal Investigator - NSERC Idea to Innovation, “Mosaïque Digital Wallets: A Fully Decentralized and Data-driven Identity and Credential Management System for Business Environments”||2020-2022||$125,000|
Principal Investigator - Mitacs Accelerate, “Security Analysis of POLARIS”
Principal Investigator - Mitacs, “Research Training Award”
Principal Investigator - Ripple Inc., “University Blockchain Research Initiative”
|2020-2021||$100,000 USD (approx. $136,210 CAD)|
Principal Investigator - SSHRC Explore, “Desired Enhancement of Privacy Involvement: An Investigation of Smartphone Users towards Protecting and Disclosing Information”
Principal Investigator - NRC IRAP / ITEA, “Interoperable Distributed Ledger Technologies (I-DELTA) Blockchain Project”
Principal Investigator - Ontario Center of Excellence (OCE) VIP, “Development and Deployment of Policy and Infrastructure on IoT Security Monitoring”
Principal Investigator - NSERC Engage Grant, “Sizing the Y2Q Problem”
Principal Investigator - NSERC Discovery Grant and Launch Supplement Grant, “Enhancing Data Security and Privacy for IoT Devices”
Principal Investigator - NSERC Collaborative Research and Development Grant, “Quantum-Resistance and Efficiency of Communications in Connected and Autonomous Vehicles”
Principal Investigator - SSHRC Insight Grant, “Barriers and Opportunities in Blockchain Technology Adoption”
Principal Investigator - Fields Institute for Research in Mathematical Sciences, “Security and Efficiency of Communication in Smart Connected Cars”
Principal Investigator - NXM Inc Technologies, “Crypto-agility of Post Quantum 5G IoT Devices”
Principal Investigator - NSERC Undergraduate Student Research Assistant Program, “IoT Identity Management”
Principal Investigator - Ontario Center of Excellence (OCE) VIP - Total Funding, “Costing Analysis of Large Scale Cryptographic Changes”
- PhD, Mathematics, University of Waterloo
- MMath, University of Waterloo
- BMath, Carleton University
- Certificate in University Teaching, University of Waterloo
- Certified Information Systems Security Professional (CISSP)
- Certified Service Oriented Architect (SOA) with Honours
- Canada Research Chair, Tier II (September 2021)
- Dean’s Scholarly Research and Creativity Award, Ryerson University (December 2020)
- Top 20 Women in Cyber Security in Canada, external link, opens in new window, IT World Canada (July 2020)
- Winner of the New Frontier in Blockchain Research: Academic Research category, external link, opens in new window, Blockchain Research Institute (July 2020)
- Canada's Tech Titans: Top 19 of 2019 Award, external link, opens in new window, IBM CASCON (November 2019)
- Top 5 Women of Influence in Security, external link, opens in new window, SC Magazine Award (July 2019)
- TRSM Outstanding Research Recognition Award, opens in new window, Ryerson University (Sep, Nov, Dec 2019)
- TRSM Research Recognition Award, opens in new window, Ryerson University (June 2019)
- Certified Service Oriented Architect (SOA) with Honours, SOA School (January 2016)
- Individual Achievers Award, Canadian Imperial Bank of Commerce (Quarter 1, 2015)