Mehrdad Nojoumian

According to our database1, Mehrdad Nojoumian authored at least 40 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of two.



In proceedings 
PhD thesis 




Localized State-Change Consensus in Immense and Highly Dynamic Environments.
Cryptogr., 2022

Social Acceptability of Autonomous Vehicles: Unveiling Correlation of Passenger Trust and Emotional Response.
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2022

Photo quality classification using deep learning.
Multim. Tools Appl., 2021

ISRaft Consensus Algorithm for Autonomous Units.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Should Self-Driving Cars Mimic Human Driving Behaviors?
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2021

Impacts of Trust Measurements on the Reputation-Based Mining Paradigm.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

Comprehensive survey on privacy-preserving protocols for sealed-bid auctions.
Comput. Secur., 2020

Secure Error Correction using Multi-Party Computation.
CoRR, 2019

Secure Trust Evaluation Using Multipath and Referral Chain Methods.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Privacy-Preserving Big Data Analytics: From Theory to Practice.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018

Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
IEEE Access, 2018

EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Secure error correction using multiparty computation.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017

Rational Trust Modeling.
IACR Cryptol. ePrint Arch., 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Ideal social secret sharing using Birkhoff interpolation method.
Secur. Commun. Networks, 2016

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Sequential Secret Sharing as a New Hierarchical Access Structure.
J. Internet Serv. Inf. Secur., 2015

Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015

Trust, Influence and Reputation Management Based on Human Reasoning.
Proceedings of the Incentive and Trust in E-Communities, 2015

Generalization of socio-rational secret sharing with a new utility function.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
Proceedings of the Information Security Practice and Experience, 2014

On dealer-free dynamic threshold schemes.
Adv. Math. Commun., 2013

Novel Secret Sharing and Commitment Schemes for Cryptographic Applications.
PhD thesis, 2012

Social secret sharing in cloud computing using a new trust function.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Socio-Rational Secret Sharing as a New Direction in Rational Cryptography.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Reengineering PDF-based documents targeting complex software specifications.
Int. J. Knowl. Web Intell., 2011

Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.
IACR Cryptol. ePrint Arch., 2011

Unconditionally secure social secret sharing scheme.
IET Inf. Secur., 2010

Brief announcement: secret sharing based on the social behaviors of players.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Comparing genetic algorithm and guided local search methods by symmetric TSP instances.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A New Approach for the Trust Calculation in Social Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006

Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006