Mehrdad Nojoumian
Mehrdad Nojoumian
Florida Atlantic University, College of Engineering and Computer Science
Verified email at - Homepage
TitleCited byYear
Unconditionally Secure Social Secret Sharing Scheme
M Nojoumian, DR Stinson, M Grainger
IET Information Security (IFS), Special Issue on Multi-Agent and Distributed …, 2010
A New Approach for the Trust Calculation in Social Networks
M Nojoumian, TC Lethbridge
3rd International Conference on E-Business (ICE-B), Setúbal, Portugal; Also …, 2006
Privacy-Preserving Protocols for Secure and Reliable Data Aggregation in IoT-Enabled Smart Metering Systems
S Tonyali, K Akkaya, N Saputro, AS Uluagac, M Nojoumian
Future Generation Computer Systems 78 (2), 547-557, 2018
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
M Nojoumian, DR Stinson
3rd Conference on Decision and Game Theory for Security (GameSec), Budapest …, 2012
On Dealer-free Dynamic Threshold Schemes
M Nojoumian, DR Stinson
Advances in Mathematics of Communications (AMC) 7 (1), 39-56, 2013
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing
M Nojoumian, DR Stinson
10th International Conference on Information Security Practice and …, 2014
Social Secret Sharing in Cloud Computing Using a New Trust Function
M Nojoumian, DR Stinson
10th IEEE Annual Conference on Privacy, Security and Trust (PST), Paris …, 2012
Novel Secret Sharing and Commitment Schemes for Cryptographic Applications
M Nojoumian
University of Waterloo, PhD Thesis, 2012
Brief Announcement: Secret Sharing Based on the Social Behaviors of Players
M Nojoumian, DR Stinson
29th ACM Symposium on Principles of Distributed Computing (PODC), Zurich …, 2010
Sequential Secret Sharing as a New Hierarchical Access Structure
M Nojoumian, DR Stinson
Journal of Internet Services and Information Security (JISIS), Special Issue …, 2015
Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT
S Subramanian, MM Kermani, R Azarderakhsh, M Nojoumian
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
M Nojoumian, D Stinson
12th International Conference on Information and Communications Security …, 2010
Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies By a Reputation-Based Paradigm
M Nojoumian, A Golchubian, L Njilla, K Kwiat, C Kamhoua
Computing Conference (CC), SAI Conferences, London, UK, 368-386, 2018
Trust, Influence and Reputation Management Based on Human Reasoning
M Nojoumian
4th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC), Austin …, 2015
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Z Eslami, N Pakniat, M Nojoumian
Security and Communication Networks 9 (18), 4973-4982, 2016
Generalization of Socio-Rational Secret Sharing with a New Utility Function
M Nojoumian
12th IEEE Annual Conference on Privacy, Security and Trust (PST), Toronto …, 2014
Extracting Document Structure to Facilitate a Knowledge Base Creation for the UML Superstructure Specification
M Nojoumian, TC Lethbridge
4th IEEE International Conference on Info Technology: New Generations (ITNG …, 2007
A Survey on Trust in Autonomous Systems
S Shahrdar, L Menezes, M Nojoumian
Computing Conference (CC), SAI Conferences, London, UK, 368-386, 2018
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper)
G Traverso, CG Cordero, M Nojoumian, R Azarderakhsh, D Demirel, ...
15th IEEE Annual Conference on Privacy, Security and Trust (PST), Calgary …, 2017
Trust, Satisfaction and Frustration Measurements During Human-Robot Interaction
MA Abd, I Gonzalez, M Nojoumian, ED Engeberg
30th Florida Conference on Recent Advances in Robotics (FCRAR), Boca Raton …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20