According to our database1, Mehrdad Nojoumian authored at least 33 papers between 2006 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions.
Computers & Security, 2020
Secure Error Correction using Multi-Party Computation.
Secure Trust Evaluation Using Multipath and Referral Chain Methods.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Privacy-Preserving Big Data Analytics: From Theory to Practice.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
IEEE Access, 2018
EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018
Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptology ePrint Archive, 2017
Rational Trust Modeling.
IACR Cryptology ePrint Archive, 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Ideal social secret sharing using Birkhoff interpolation method.
Security and Communication Networks, 2016
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Sequential Secret Sharing as a New Hierarchical Access Structure.
J. Internet Serv. Inf. Secur., 2015
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015
Trust, Influence and Reputation Management Based on Human Reasoning.
Proceedings of the Incentive and Trust in E-Communities, 2015
Generalization of socio-rational secret sharing with a new utility function.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
Proceedings of the Information Security Practice and Experience, 2014
On dealer-free dynamic threshold schemes.
Adv. in Math. of Comm., 2013
Novel Secret Sharing and Commitment Schemes for Cryptographic Applications.
PhD thesis, 2012
Social secret sharing in cloud computing using a new trust function.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Reengineering PDF-based documents targeting complex software specifications.
I. J. Knowledge and Web Intelligence, 2011
Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.
IACR Cryptology ePrint Archive, 2011
Unconditionally secure social secret sharing scheme.
IET Information Security, 2010
Brief announcement: secret sharing based on the social behaviors of players.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Comparing genetic algorithm and guided local search methods by symmetric TSP instances.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
A New Approach for the Trust Calculation in Social Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006
Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006