According to our database1, Mehrdad Nojoumian authored at least 40 papers between 2006 and 2022.
Legend:Book In proceedings Article PhD thesis Other
Social Acceptability of Autonomous Vehicles: Unveiling Correlation of Passenger Trust and Emotional Response.
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2022
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2021
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Comput. Secur., 2020
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Secur. Commun. Networks, 2016
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
J. Internet Serv. Inf. Secur., 2015
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015
Proceedings of the Incentive and Trust in E-Communities, 2015
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Information Security Practice and Experience, 2014
PhD thesis, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Int. J. Knowl. Web Intell., 2011
Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Comparing genetic algorithm and guided local search methods by symmetric TSP instances.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the E-Business and Telecommunication Networks, 2006
Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006