Mehrdad Nojoumian

According to our database1, Mehrdad Nojoumian authored at least 33 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions.
Computers & Security, 2020

2019
Secure Error Correction using Multi-Party Computation.
CoRR, 2019

Secure Trust Evaluation Using Multipath and Referral Chain Methods.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Privacy-Preserving Big Data Analytics: From Theory to Practice.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

2018
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018

Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
IEEE Access, 2018

EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

2017
Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptology ePrint Archive, 2017

Rational Trust Modeling.
IACR Cryptology ePrint Archive, 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
Ideal social secret sharing using Birkhoff interpolation method.
Security and Communication Networks, 2016

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Sequential Secret Sharing as a New Hierarchical Access Structure.
J. Internet Serv. Inf. Secur., 2015

Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015

Trust, Influence and Reputation Management Based on Human Reasoning.
Proceedings of the Incentive and Trust in E-Communities, 2015

2014
Generalization of socio-rational secret sharing with a new utility function.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
Proceedings of the Information Security Practice and Experience, 2014

2013
On dealer-free dynamic threshold schemes.
Adv. in Math. of Comm., 2013

2012
Novel Secret Sharing and Commitment Schemes for Cryptographic Applications.
PhD thesis, 2012

Social secret sharing in cloud computing using a new trust function.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Socio-Rational Secret Sharing as a New Direction in Rational Cryptography.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

2011
Reengineering PDF-based documents targeting complex software specifications.
I. J. Knowledge and Web Intelligence, 2011

Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.
IACR Cryptology ePrint Archive, 2011

2010
Unconditionally secure social secret sharing scheme.
IET Information Security, 2010

Brief announcement: secret sharing based on the social behaviors of players.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2008
Comparing genetic algorithm and guided local search methods by symmetric TSP instances.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
A New Approach for the Trust Calculation in Social Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006

Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006


  Loading...