Dr. Atefeh (Atty) Mashatan is the founder and director of the Cybersecurity Research Lab (CRL) at Ryerson University and recognized as a leading expert in cryptography, blockchain technology, quantum-resistant solutions, enterprise security architecture and Internet-of-Things (IoT) security.
Mashatan’s expertise at the frontlines of the global cybersecurity field was recognized by SC Magazine in 2019, when she was named one of the top five Women of Influence in Security. She was recognized as one of Canada’s Top 19 of 2019 Tech Titans at IBM CASCON Evoke conference for her efforts in developing emerging technological solutions to address timely societal needs. In 2020, she received the Enterprise Blockchain Award in the category of New Frontiers in Blockchain Academic Research by Blockchain Research Institute for developing the Mosaïque Digital Wallet, which is a fully decentralized identity management system for business environments. Most recently, she received the recognition of Top Women in Cybersecurity in Canada for her efforts in advancing cybersecurity research and training highly qualified personnel in the field.
Through strategic collaborations with government and industry, Mashatan and the CRL seek to spearhead crucial, ongoing dialogue with the Information and Computer Technology (ICT) industry in Canada, and to help solve industry problems through cutting edge information security and research into cyber risk mitigation strategies and solutions. Previously, Mashatan was a Scientific Collaborator at the Security and Cryptography Laboratory of School of Computer and Communication Sciences, EPFL (Swiss Federal Institute of Technology, Lausanne), where she conducted research into cryptographic protocols, followed by a position at CIBC, where she was a Senior Information Security Consultant and Solutions Architect focusing on cryptography and enterprise architecture.
Since 2016, Mashatan has been a professor of information technology management at Ryerson where she is training the next generation of cybersecurity experts. Mashatan serves on the board of directors at Compute Ontario, a consortia which serves to drive the province’s capacity in advanced research computing and big data; and on the board of the Rogers Cybersecure Catalyst, which is dedicated to solving critical cybersecurity challenges, accelerating Canadian cyber technologies and creating new opportunities for Canadian workers and entrepreneurs. As of recently, she has joined the Core Group at the National Research Council of Canada (NRC), who will focus on the Canadian challenges that will arise over the next 10 to 15 years through six areas of critical importance, including cybersecurity and privacy.
Her research has been supported by numerous industry partners as well as agencies such as the Natural Sciences and Engineering Research Council of Canada, the Social Sciences and Humanities Research Council of Canada and the Ontario Centres of Excellence. She is a Certified Service Oriented Architect (SOA) with Honours and holds a Certified Information Systems Security Professional (CISSP) certification from the International Information Systems Security Certification Consortium (ISC2).
Dr. Mashatan has an Erdős Number of 2!, external link This is the best a researcher can achieve since 1996 when Paul Erdős passed away.
Security of Internet of Things (IoT), Privacy enhancing technologies, Information Technology Security & Management, Big data and data security, Cryptographic Protocols, Postquantum Cryptography, Security in Ad Hoc Pervasive Networks.
|Refereed Journal Articles|
|M. Edwards, A. Mashatan, and S. Ghose, “A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols,” Quantum Information Processing, vol. 19, no. 184, pp. 1-22, May 11, 2020. (Q1 in Theoretical Computer Science and IF: 2.433)|
|M. R. Alagheband, A. Mashatan, and M. Zihayat, “Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media,” ACM Transactions on Management Information Systems (Special Issue on Analytics for Cybersecurity and Privacy). (Forthcoming. 21 pages. Submission: September 11, 2019. Acceptance: March 22, 2020) (Q1 in Computer Science)|
|A. Mashatan, M. Lee, V. Lemieux, and Z. Roberts, “Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology,” Journal of Database Management. (Forthcoming. 34 pages. Submission: May 29, 2019. Acceptance: April 12, 2020, IF: 1.138)|
|A. Farouk, A. Alahmadi, S.Ghose, and A. Mashatan. “Blockchain platform for industrial healthcare: Vision and future opportunities,” Computer Communications, vol. 154, pp. 223-235, March 15, 2020. (IF: 2.816)|
|B. Kamiński, L. Kraiński, A. Mashatan, P. Prałat, and P. Szufel, “Multiagent Routing Simulation with Partial Smart Vehicles Penetration,” Journal of Advanced Transportation, vol. 2020, pp. 1-11, March 3, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 1.670)|
|M. Demir, O. Turetken, and A. Mashatan, “An Enterprise Transformation Guide for the Inevitable Blockchain Disruption,” IEEE Computer, vol. 53, no. 6, pp. 34-43, June 2020. (IF: 4.419)|
|A. Mashatan and O. Turetken, “Preparing for the Information Security Threat from Quantum Computers,” MIS Quarterly Executive, vol. 19, no. 2, pp. 157 - 164, May 31, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 4.088)|
|H. Abulkasim, A. Farouk, S. Hamad, A. Mashatan, and S. Ghose, “Secure dynamic multiparty quantum private comparison,” Scientific Reports, vol. 9, no. 17818, pp. 1-16, November 28, 2019. (IF: 3.998)|
|M. Dehghani, A. Mashatan, and R. W. Kennedy, “Innovation within networks – patent strategies for blockchain technology,” Journal of Business & Industrial Marketing, vol. ahead-of-print, no. ahead-of-print, February 14, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 2.497)|
|H. Abulkasim, H. Alsuqaih, W. Hamdan, S. Hamad, A. Farouk, A. Mashatan, and S. Ghose, “Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network,” IEEE Access, vol. 7, pp. 17917-17926, January 21, 2019. (IF: 3.745)|
|K. Petrenko, A. Mashatan, and F. Shirazi, “Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization,” Journal of Information Security and Applications, vol. 46, pp. 151-163, June 2019. (IF: 2.327)|
A. Bay, A. Mashatan, and S. Vaudenay, “Revisiting iterated attacks in the context of decorrelation theory,” Cryptography and Communications, vol. 6, no. 4, pp. 279-311, December 2014.
E. Malekian, A. Mashatan, and A. Zakerolhosseini, “QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems,” The ISC International Journal of Information Security, vol. 3, no. 1, pp. 29-42, January 2011.
A. Mashatan and D. R. Stinson, “Practical unconditionally secure two-channel message authentication,” Designs, Codes and Cryptography, vol. 55, no. 2-3, pp. 169-188, May 2010.
I. Goldberg, A. Mashatan, and D. R. Stinson, “On message recognition protocols: recoverability and explicit confirmation,” International Journal of Applied Cryptography, vol. 2, no. 2, pp. 100-120, January 2010.
|A. Mashatan and D. R. Stinson, “Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions,” International Journal of Information Security, vol. 8, no. 1, pp. 49–60, February 2009.|
|A. Mashatan and D. R. Stinson, “Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions,” IET Information Security, vol. 1, no. 3, pp. 111-118, September 2007.|
|Refereed Conference Proceedings|
|M.S. Sangari and A. Mashatan. “Blockchain-enabled Supply Chain for Building Resilience Through Exploitation and Exploration: How do Supply Chain Contingencies Affect Adoption Outcomes?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.|
|M.S. Sangari and A. Mashatan. “Towards a Predictive Model of Blockchain-based Medical Records Adoption: How do Technology Readiness and Initial Trust Affect Behavioral Intentions?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.|
|B. Kaminski, L. Kraiński, A. Mashatan, P. Pralat, and P. Szufel. “Multi-agent routing simulation with partial smart vehicles penetration” in Proc. Transp. Sci. & Logistics (TSL) 2nd Triennial Conf., May 27-29, 2020.|
|A. Gruzd, D. Abul-Fottouh, and A. Mashatan, “Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations” in Proc. 2020 HICSS Conf., (Grand Wailea, HI, USA), January 7, 2020.|
|M. Demir, A. Mashatan, O. Turetken, and A. Ferworn, “Utility Blockchain for Transparent Disaster Recovery” in Proc. 2018 IEEE Elec. Power and Energy Conf. (EPEC), (Toronto, ON, Canada), January 3, 2019, pp. 1-6.|
|A. Mashatan and Z. Roberts, “An Enhanced Real Estate Transaction Process Based on Blockchain Technology” in Proc. 23rd Americas Conf. Info. Sys. (AMCIS), (Boston, MA, USA), May 17, 2017, pp. 11-17.|
|A. Mashatan and S. Vaudenay, “Fully Dynamic Universal Accumulators” in Proc. Romanian Crypto. Conf., (Bucharest, Romania), January 2013, pp. 269-285.|
|A. Bay, A. Mashatan, and S. Vaudenay, “Resistance Against Iterated Attacks by Decorrelation Theory, Revisited” in Proc. CRYPTO, (Santa Barba, CA, USA), August 2012, pp. 741-757.|
|A. Bay, A. Mashatan, and S. Vaudenay, “Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers” in Proc. INDOCRYPT, (New Delhi, India), December 2012, pp. 528-544.|
|A. Mashatan and K. Ouafi, “Forgery-Resilience for Digital Signature Schemes: A new paradigm for practical digital signature schemes exhibiting desirable legislative properties” in Proc. 7th ACM Symp. Inf., Comput. and Comm. Security, AsiaCCS, (Seoul, South Korea), May 2012, pp. 24-46.|
|A. Mashatan and K. Ouafi, “Efficient Fail-Stop Signatures from the Factoring Assumption” in Proc. 14th Inf. Sec. Conf. (ISC 2011), (Xi’an, China), October 2011, pp. 372-385.|
|A. Mashatan and S. Vaudenay, “A Message Recognition Protocol Based on Standard Assumptions” in Jianying Zhou and Moti Yung (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Beijing, China), June 2010, pp. 384-401.|
|I. Goldberg, A. Mashatan, and D. R. Stinson, “A new message recognition protocol with self-recoverability for ad hoc pervasive networks” in Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, and Damien Vergnaud (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Paris-Rocquencourt, France), May 2009, pp. 219-237.|
|A. Mashatan and D. R. Stinson, “A new message recognition protocol for ad hoc pervasive networks” in M. K. Franklin, L. C. K. Hui and D. S. Wong (Eds.), in Proc. Crypto. and Net. Sec.,7th Int. Conf. (CANS), (Hong-Kong, China), December 2008, pp. 378-394.|
|Patents and Invention Disclosures|
|Mosaïque: A Fully Decentralized and Data-driven Identity and Credential Management System for Business Environments by D. McKay and A. Mashatan. (2020, May 3).|
|Quantum-Resistant Augmented Key/Data Encapsulation Mechanism Encryption Algorithm (QUAKE) by B. Goncalvez and A. Mashatan. (2019, Jan. 25).|
|Method and apparatus for providing efficient management of certificate revocation by A. Mashatan, I. Aad, S. Vaudenay, P. V. Niemi, and R. Chaabouni. (2015). US 9083535 B2 [Online] Available: , external linkhttps://patentswarm.com/patents/US9083535B2, external link|
Atefeh Mashatan and Serge Vaudenay (2013), Fully Dynamic Universal Accumulators. Proceedings of the Romanian Academy, vol. 14: 269-285.
Jean-Philippe Aumasson, Atefeh Mashatan, and Willi Meier (2009), More on Shabal’s permutation. Official Comment - NIST Hash Competition.
Atefeh Mashatan (2008), Do student ratings of mathematics professors in research universities tend to discriminate against female instructors? 19 pages. This paper was a research project and a requirement for Certificate In University Teaching, Centre for Teaching Excellence, Waterloo, Ontario.
|Course Code||Course Title|
Directed Reading: User Acceptability of cryptocurrencies using Twitter data
Directed Readings: Quantum Computing Threat to Information and Communication Technologies
Directed Reading: Intellectual Property and Blockchain Technology Innovations
- Cryptography and Security
- Advanced Security
- Introduction to Graph Theory
- Math Discovery and Innovation
- Applied Cryptography
- Calculus II for Engineers
- Math of Public-Key Cryptography
- Discrete Math for Engineers
- Combinatorial Enumeration
- Introduction to Combinatorics
|Grant or Project Title||Year||Amount|
Principal Investigator - Mitacs Accelerate, “Security Analysis of POLARIS”
Principal Investigator - Mitacs, “Research Training Award”
Principal Investigator - Ripple Inc., “University Blockchain Research Initiative”
|2020-2021||$100,000 USD (approx. $136,210 CAD)|
Principal Investigator - SSHRC Explore, “Desired Enhancement of Privacy Involvement: An Investigation of Smartphone Users towards Protecting and Disclosing Information”
Principal Investigator - NRC IRAP / ITEA, “Interoperable Distributed Ledger Technologies (I-DELTA) Blockchain Project”
Principal Investigator - Ontario Center of Excellence (OCE) VIP, “Development and Deployment of Policy and Infrastructure on IoT Security Monitoring”
Principal Investigator - NSERC Engage Grant, “Sizing the Y2Q Problem”
Principal Investigator - NSERC Discovery Grant and Launch Supplement Grant, “Enhancing Data Security and Privacy for IoT Devices”
Principal Investigator - NSERC Collaborative Research and Development Grant, “Quantum-Resistance and Efficiency of Communications in Connected and Autonomous Vehicles”
Principal Investigator - SSHRC Insight Grant, “Barriers and Opportunities in Blockchain Technology Adoption”
Principal Investigator - Fields Institute for Research in Mathematical Sciences, “Security and Efficiency of Communication in Smart Connected Cars”
Principal Investigator - NXM Inc Technologies, “Crypto-agility of Post Quantum 5G IoT Devices”
Principal Investigator - NSERC Undergraduate Student Research Assistant Program, “IoT Identity Management”
Principal Investigator - Ontario Center of Excellence (OCE) VIP - Total Funding, “Costing Analysis of Large Scale Cryptographic Changes”
- PhD, Mathematics, University of Waterloo
- MMath, University of Waterloo
- BMath, Carleton University
- Certificate in University Teaching, University of Waterloo
- Certified Information Systems Security Professional (CISSP)
- Certified Service Oriented Architect (SOA) with Honours
- Top 20 Women in Cyber Security in Canada, external link, opens in new window, IT World Canada (July 2020)
- Winner of the New Frontier in Blockchain Research: Academic Research category, external link, opens in new window, Blockchain Research Institute (July 2020)
- Canada's Tech Titans: Top 19 of 2019 Award, external link, opens in new window, IBM CASCON (November 2019)
- Top 5 Women of Influence in Security, external link, opens in new window, SC Magazine Award (July 2019)
- TRSM Outstanding Research Recognition Award, opens in new window, Ryerson University (Sep, Nov, Dec 2019)
- TRSM Research Recognition Award, opens in new window, Ryerson University (June 2019)
- Certified Service Oriented Architect (SOA) with Honours, SOA School (January 2016)
- Individual Achievers Award, Canadian Imperial Bank of Commerce (Quarter 1, 2015)