Mehrdad Nojoumian

According to our database1, Mehrdad Nojoumian
  • authored at least 28 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of five.



In proceedings 
PhD thesis 




Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Generation Comp. Syst., 2018

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptology ePrint Archive, 2017

Rational Trust Modeling.
IACR Cryptology ePrint Archive, 2017

Rational Trust Modeling.
CoRR, 2017

Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Ideal social secret sharing using Birkhoff interpolation method.
Security and Communication Networks, 2016

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Sequential Secret Sharing as a New Hierarchical Access Structure.
J. Internet Serv. Inf. Secur., 2015

Sequential Secret Sharing as a New Hierarchical Access Structure.
IACR Cryptology ePrint Archive, 2015

Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015

Trust, Influence and Reputation Management Based on Human Reasoning.
Proceedings of the Incentive and Trust in E-Communities, 2015

Generalization of socio-rational secret sharing with a new utility function.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
Proceedings of the Information Security Practice and Experience, 2014

On dealer-free dynamic threshold schemes.
Adv. in Math. of Comm., 2013

Novel Secret Sharing and Commitment Schemes for Cryptographic Applications.
PhD thesis, 2012

Social secret sharing in cloud computing using a new trust function.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Socio-Rational Secret Sharing as a New Direction in Rational Cryptography.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Reengineering PDF-based documents targeting complex software specifications.
I. J. Knowledge and Web Intelligence, 2011

Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.
IACR Cryptology ePrint Archive, 2011

Unconditionally secure social secret sharing scheme.
IET Information Security, 2010

Brief announcement: secret sharing based on the social behaviors of players.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Reengineering PDF-Based Documents Targeting Complex Software Specifications
CoRR, 2009

Comparing genetic algorithm and guided local search methods by symmetric TSP instances.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A New Approach for the Trust Calculation in Social Networks.
Proceedings of the ICE-B 2006, 2006

Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006