You are now in the main content area
Recent Publications

The Cybersecurity Research Lab at Ted Rogers School of Management focuses on research based on the challenges and opportunities within the landscape of cybersecurity. Our researchers in the lab and industry partners collaborate to create publications which cover a wide variety of fields within cybersecurity, such as Blockchain, IoT, Privacy, Quantum, and more.
Below are a list of our published papers. If you have any questions or comments, please contact us via crl@torontomu.ca.
Journals
2024
- Breaking the mold: the pursuit of decentralized trade and supply chain finance (opens in new window)
- Optimal roadworks schedule in multi-agent transportation models (opens in new window)
- Introducing technological disruption: How breaking media attention on corporate events impacts online sentiment (opens in new window)
- What is driving consumer resistance to crypto‐payment? A multianalytical investigation (opens in new window)
- Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan (opens in new window)
2023
- XMal: A lightweight memory-based explainable obfuscated-malware detector (opens in new window)
- Formal unlinkability analysis of message authentication protocols based on authentic channels (opens in new window)
- Quantum Computing and IS - Harnessing the Opportunities of Emerging Technologies (opens in new window)
- From Zero to One Hundred - Demystifying zero trust and its implications on enterprise people, process, and technology (opens in new window)
- The Arrival of Zero Trust: What Does it Mean? (opens in new window)
2022
- A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs (opens in new window)
- Advanced encryption schemes in multi-tier heterogeneous internet of things: Taxonomy, capabilities, and objectives (opens in new window)
- Controlled quantum teleportation in the presence of an adversary (opens in new window)
- High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology (opens in new window)
- Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment (opens in new window)
- How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study (opens in new window)
- Tightly Secure PKE Combiner in the Quantum Random Oracle Model (opens in new window)
- A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase (opens in new window)
- Distributed Renewable Energy Management: A Gap Analysis and Proposed Blockchain-Based Architecture (opens in new window)
- Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives (opens in new window)
- On the Security of the Dandelion Protocol (opens in new window)
- Security Improvements for Privacy-Preserving Quantum Multiparty Computation based on Circular Structure (opens in new window)
2021
- Innovation Within Networks – Patent Strategies for Blockchain Technology (opens in new window)
- Quantum-based Privacy-Preserving Sealed-bid Auction on the Blockchain (opens in new window)
- Quantum-safe Trust for Vehicles: The race is already on (opens in new window)
- The Complex Path to Quantum Resistance (opens in new window)
- Distributed Interoperable Records: The Key to Better Supply Chain Management (opens in new window)
- A Cross-Pollination of ideas about Distributed Ledger Technological Innovation through a Multidisciplinary and Multisectoral lens: Insights from the Blockchain Technology Symposium ’21 (opens in new window)
- Secure multiparty quantum key agreement against collusive attacks (opens in new window)
- Optimization of the cost of urban traffic through an online bidding platform for commuters. (opens in new window)
- On broadcasting time in the model of travelling agents (opens in new window)
- Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology (opens in new window)
2020
- Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media (opens in new window)
- Touching Holograms with Windows Mixed Reality: Renovating the Consumer Retailing Services (opens in new window)
- An Enterprise Transformation Guide for the Inevitable Blockchain Disruption (opens in new window)
- Preparing for the Information Security Threat from Quantum Computers (opens in new window)
- A review of quantum and hybrid quantum/classical blockchain protocols (opens in new window)
- Blockchain platform for industrial healthcare: Vision and future opportunities (opens in new window)
- Multiagent Routing Simulation with Partial Smart Vehicles Penetration (opens in new window)
2019
- Secure dynamic multiparty quantum private comparison (opens in new window)
- Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization (opens in new window)
- Improved Dynamic Multi-Party Quantum Private Comparison for Next Generation Mobile Network (opens in new window)
Conference Proceedings
- ConCERTS: An IoT Cybersecurity Research Range for Education, Experimentation, and Security Research (opens in new window) (opens in new window)
- Understanding Adoption Intentions for Blockchain-based Personal Health Records: Integrating Technology Usage and Initial Trust Perspectives (opens in new window)
- Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability (opens in new window)
- Implications of Organizational Governance on Cybersecurity Management: A Qualitative Study in Higher Education (opens in new window)
- Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction (opens in new window)
- PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing (opens in new window)
- Environmental Factors that Hinder an Organization’s Ability to Learn from Cyber Incidents: A Case Study on SolarWinds (opens in new window)
- Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things (opens in new window)
- Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture (opens in new window)
- Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment (opens in new window)
- Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks (opens in new window)
- Digital Privacy Literacy and Privacy Preservation: Towards a New Scale
- XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things (opens in new window)
- Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions (opens in new window)
- Blockchain-enabled supply chain for building resilience through exploitation and exploration: How do supply chain contingencies affect adoption outcomes? (opens in new window)
- Towards a predictive model of blockchain-based medical records adoption: How do technology readiness and initial trust affect behavioral intentions? (opens in new window)
- Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations (opens in new window)
- Utility Blockchain for Transparent Disaster Recovery (opens in new window)
- An Enhanced Real Estate Transaction Process Based on Blockchain Technology (opens in new window)