default search action
Mehrdad Nojoumian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Fangming Qu, Nolan Dang, Borko Furht, Mehrdad Nojoumian:
Comprehensive study of driver behavior monitoring systems using computer vision and machine learning techniques. J. Big Data 11(1): 32 (2024) - 2023
- [j12]Ari Shaller, Linir Zamir, Mehrdad Nojoumian:
Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures. Inf. Comput. 295(Part B): 105112 (2023) - 2022
- [j11]Linir Zamir, Mehrdad Nojoumian:
Localized State-Change Consensus in Immense and Highly Dynamic Environments. Cryptogr. 6(2): 23 (2022) - [c26]Corey Park, Mehrdad Nojoumian:
Social Acceptability of Autonomous Vehicles: Unveiling Correlation of Passenger Trust and Emotional Response. HCI (34) 2022: 402-415 - 2021
- [j10]Arash Golchubian, Oge Marques, Mehrdad Nojoumian:
Photo quality classification using deep learning. Multim. Tools Appl. 80(14): 22193-22208 (2021) - [c25]Pouya Pourtahmasbi, Mehrdad Nojoumian:
Impacts of Trust Measurements on the Reputation-Based Mining Paradigm. BRAINS 2021: 225-228 - [c24]Jamie Craig, Mehrdad Nojoumian:
Should Self-Driving Cars Mimic Human Driving Behaviors? HCI (30) 2021: 213-225 - [c23]Linir Zamir, Aman Shaan, Mehrdad Nojoumian:
ISRaft Consensus Algorithm for Autonomous Units. ICNP 2021: 1-6 - 2020
- [j9]Ramiro Alvarez, Mehrdad Nojoumian:
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. Comput. Secur. 88 (2020)
2010 – 2019
- 2019
- [c22]Shervin Shahrdar, Corey Park, Mehrdad Nojoumian:
Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator. AIES 2019: 515-520 - [c21]Mohammad G. Raeini, Mehrdad Nojoumian:
Privacy-Preserving Big Data Analytics: From Theory to Practice. SpaCCS Workshops 2019: 45-59 - [c20]Mohammad G. Raeini, Mehrdad Nojoumian:
Secure Trust Evaluation Using Multipath and Referral Chain Methods. STM 2019: 124-139 - [i7]Mohammad G. Raeini, Mehrdad Nojoumian:
Secure Error Correction using Multi-Party Computation. CoRR abs/1905.04643 (2019) - 2018
- [j8]Carlos Garcia Cordero, Giulia Traverso, Mehrdad Nojoumian, Sheikh Mahbub Habib, Max Mühlhäuser, Johannes Buchmann, Emmanouil Vasilomanolakis:
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection. IEEE Access 6: 72427-72438 (2018) - [j7]Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian:
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. Future Gener. Comput. Syst. 78: 547-557 (2018) - [c19]Mohammad G. Raeini, Mehrdad Nojoumian:
Secure error correction using multiparty computation. CCWC 2018: 468-473 - [c18]Mehrdad Nojoumian:
Rational Trust Modeling. GameSec 2018: 418-431 - [c17]Corey Park, Shervin Shahrdar, Mehrdad Nojoumian:
EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator. SAM 2018: 297-300 - 2017
- [j6]Srivatsan Subramanian, Mehran Mozaffari Kermani, Reza Azarderakhsh, Mehrdad Nojoumian:
Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(10): 1750-1758 (2017) - [c16]Mehrdad Nojoumian, Arash Golchubian, Nico Saputro, Kemal Akkaya:
Preventing collusion between SDN defenders anc attackers using a game theoretical approach. INFOCOM Workshops 2017: 802-807 - [c15]Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper). PST 2017: 277-282 - [i6]Mehrdad Nojoumian:
Rational Trust Modeling. CoRR abs/1706.09861 (2017) - [i5]Mehrdad Nojoumian:
Rational Trust Modeling. IACR Cryptol. ePrint Arch. 2017: 646 (2017) - [i4]Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. IACR Cryptol. ePrint Arch. 2017: 728 (2017) - 2016
- [j5]Ziba Eslami, Nasrollah Pakniat, Mehrdad Nojoumian:
Ideal social secret sharing using Birkhoff interpolation method. Secur. Commun. Networks 9(18): 4973-4982 (2016) - [c14]Mehrdad Nojoumian:
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques. PST 2016: 269-274 - 2015
- [j4]Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. J. Internet Serv. Inf. Secur. 5(2): 24-32 (2015) - [c13]Mehrdad Nojoumian:
Trust, Influence and Reputation Management Based on Human Reasoning. AAAI Workshop: Incentive and Trust in E-Communities 2015 - [c12]Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya:
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. ICISSP 2015: 106-113 - [i3]Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. IACR Cryptol. ePrint Arch. 2015: 403 (2015) - 2014
- [c11]Mehrdad Nojoumian, Douglas R. Stinson:
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. ISPEC 2014: 302-317 - [c10]Mehrdad Nojoumian:
Generalization of socio-rational secret sharing with a new utility function. PST 2014: 338-341 - 2013
- [j3]Mehrdad Nojoumian, Douglas R. Stinson:
On dealer-free dynamic threshold schemes. Adv. Math. Commun. 7(1): 39-56 (2013) - 2012
- [b1]Mehrdad Nojoumian:
Novel Secret Sharing and Commitment Schemes for Cryptographic Applications. University of Waterloo, Ontario, Canada, 2012 - [c9]Mehrdad Nojoumian, Douglas R. Stinson:
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography. GameSec 2012: 18-37 - [c8]Mehrdad Nojoumian, Douglas R. Stinson:
Social secret sharing in cloud computing using a new trust function. PST 2012: 161-167 - 2011
- [j2]Mehrdad Nojoumian, Timothy C. Lethbridge:
Reengineering PDF-based documents targeting complex software specifications. Int. J. Knowl. Web Intell. 2(4): 292-319 (2011) - [i2]Mehrdad Nojoumian:
Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory. IACR Cryptol. ePrint Arch. 2011: 370 (2011) - 2010
- [j1]Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger:
Unconditionally secure social secret sharing scheme. IET Inf. Secur. 4(4): 202-211 (2010) - [c7]Mehrdad Nojoumian, Douglas R. Stinson:
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. ICICS 2010: 266-280 - [c6]Mehrdad Nojoumian, Douglas R. Stinson:
Brief announcement: secret sharing based on the social behaviors of players. PODC 2010: 239-240
2000 – 2009
- 2009
- [i1]Mehrdad Nojoumian, Timothy C. Lethbridge:
Reengineering PDF-Based Documents Targeting Complex Software Specifications. CoRR abs/0905.4717 (2009) - 2008
- [c5]Mehrdad Nojoumian, Divya K. Nair:
Comparing genetic algorithm and guided local search methods by symmetric TSP instances. GECCO 2008: 1131-1132 - 2007
- [c4]Mehrdad Nojoumian, Timothy C. Lethbridge:
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification. ITNG 2007: 393-400 - 2006
- [c3]Mehrdad Nojoumian, Thomas T. Tran:
Computational Politics and Economy for the Establishment of an Integrated Intelligent Government. CCECE 2006: 332-336 - [c2]Mehrdad Nojoumian, Timothy C. Lethbridge:
A New Approach for the Trust Calculation in Social Networks. ICETE (Selected Papers) 2006: 64-77 - [c1]Mehrdad Nojoumian, Timothy C. Lethbridge:
A New Approach for the Trust Calculation in Social Networks. ICE-B 2006: 257-264
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint