Invited Talk

Mehrdad Nojoumian

Assistant Professor
Contact: 408-508-4002
mMyLastName (at) faudotedu

My research interests lie on applied cryptography, security and privacy, trust management, game theory and interdisciplinary research on the intersection of computer and social sciences such as economics and psychology. Currently, I am looking for highly motivated and talented PhD students. Please contact me (with your CV) if you are interested in performing research in our interdisciplinary research lab.

Education   ^
Funding   ^
Honor/Award   ^
Experience   ^
Teaching/Supervising   ^

Teaching at FAU
Teaching at SIU
Research   ^

Highlights: Human-Inspired Trust Model, Sealed-Bid Auctions, Social SS, Socio-Rational SS, Dynamic Threshold Schemes, Sequential SS.

Refereed Journals

  1. Tonyali S., Akkaya K., Saputro N., Uluagac A. S. and Nojoumian M.
    Privacy-Preserving Protocols for Secure and Reliable Data Aggregation in IoT-Enabled Smart Metering Systems.
    Future Generation Computer Systems (FGCS), Elsevier, DOI: 10.1016/j.future.2017.04.031, 2017.

  2. Subramanian S., Mozaffari Kermani M., Azarderakhsh R. and Nojoumian M.
    Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT.
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), DOI: 10.1109/TCAD.2017.2661811, 2017.

  3. Eslami Z., Pakniat N. and Nojoumian M.
    Ideal Social Secret Sharing Using Birkhoff Interpolation Method.
    Security and Communication Networks (SCN), John Wiley & Sons, Ltd, vol. 9, issue 18, PP. 4973-4982, 2016.

  4. Nojoumian M. and Stinson D. R.
    Sequential Secret Sharing as a New Hierarchical Access Structure.
    Journal of Internet Services and Info Security (JISIS), Next Gen Networks and Systems Security, vol. 5, issue 2, pp. 24-32, 2015.

  5. Nojoumian M. and Stinson D. R.
    On Dealer-free Dynamic Threshold Schemes.
    Advances in Mathematics of Communications (AMC), American Institute of Math Sciences, vol. 7, no. 1, pp. 39-56, 2013.

  6. Nojoumian M. and Lethbridge T. C.
    Reengineering PDF-Based Documents Targeting Complex Software Specifications.
    International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience, vol. 2, no. 4, pp. 292-319, 2011.

  7. Nojoumian M., Stinson D. R., and Grainger M.
    Unconditionally Secure Social Secret Sharing Scheme.
    IET Information Security (IFS), Multi-Agent and Distributed Information Security, vol. 4, issue 4, pp. 202-211, 2010.

  8. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks.
    E-Business and Telecommunication Networks (E-BTN): Selected Papers of ICETE 06, Springer CCIS, vol. 9, pp. 64-77, 2008.
    Acceptance Rate: 29/326: 9%
Refereed Conferences

  1. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Impacts of Robot Assistant Performance on Human Trust, Satisfaction, and Frustration.
    Robotics, Science and Systems: Morality and Social Trust in Autonomous Robots Workshop (RSS), 4 pages, Boston, USA, 2017.

  2. Traverso G., Garcia C., Nojoumian M., Demirel D., Azarderakhsh R., Habib S.M. and Buchmann J.
    Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
    15th IEEE Annual Conference on Privacy, Security and Trust (PST), 6 pages, Calgary, Canada, 2017.

  3. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Trust, Satisfaction and Frustration Measurements for Real-Time Human-Robot Interaction.
    30th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 89-93, Boca Raton, USA, 2017.

  4. Nojoumian M., Golchubian A., Saputro N. and Akkaya K.
    Preventing Collusion Between SDN Defenders and Attackers Using a Game Theoretical Approach.
    IEEE INFOCOM: Advances in Software Defined & Context Aware Cognitive Radio Networks (SCAN), 6 pages, Atlanta, USA, 2017.

  5. Nojoumian M.
    Unconditionally Secure Proactive Verifiable Secret Sharing Using New Detection and Recovery Techniques.
    14th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 269-274, Auckland, New Zealand, 2016.

  6. Nojoumian M. and Stinson D. R.
    Dealer-Free Threshold Changeability in Secret Sharing Schemes.
    9th International Conference on Information Theoretic Security (ICITS), Tacoma, USA, August 10, 2016.

  7. Nojoumian M. and Stinson D. R.
    From Rational Secret Sharing to Social and Socio-Rational Secret Sharing.
    5th World Congress of the Game Theory Society (GAMES), Maastricht, The Netherlands, July 24, 2016.

  8. Krishnamachari S., Nojoumian M., and Akkaya K.
    Implementation and Analysis of Dutch-Style Sealed-Bid Auctions: Computational vs Unconditional Security.
    1st International Conference on Information Systems Security and Privacy (ICISSP), pp. 106-113, Angers, France, 2015.

  9. Nojoumian M.
    Trust, Influence and Reputation Management Based on Human Reasoning.
    4th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC), pp. 21-24, Austin, USA, 2015.

  10. Nojoumian M.
    Generalization of Socio-Rational Secret Sharing with a New Utility Function.
    12th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 338-341, Toronto, Canada, 2014.

  11. Nojoumian M. and Stinson D. R.
    Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.
    10th Int Conf on Info Security Practice and Experience (ISPEC), Springer LNCS 8434, pp. 302-317, Fuzhou, China, 2014.
    Acceptance Rate: 36/158: 23%

  12. Nojoumian M. and Stinson D. R.
    Socio-Rational Secret Sharing as a New Direction in Rational Cryptography.
    3rd Conf on Decision and Game Theory for Security (GameSec), Springer LNCS 7638, pp. 18-37, Budapest, Hungary, 2012.
    Acceptance Rate: 10/37: 27%

  13. Nojoumian M. and Stinson D. R.
    Social Secret Sharing in Cloud Computing Using a New Trust Function.
    10th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 161-167, Paris, France, 2012.

  14. Nojoumian M. and Stinson D. R.
    Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
    12th Int Conf on Info and Communications Security (ICICS), Springer LNCS 6476, pp. 266-280, Barcelona, Spain, 2010.
    Acceptance Rate: 31/135: 23%

  15. Nojoumian M. and Stinson D. R.
    Brief Announcement: Secret Sharing Based on the Social Behaviors of Players.
    29th ACM Symposium on Principles of Distributed Computing (PODC), pp. 239-240, Zurich, Switzerland, 2010.

  16. Nojoumian M. and Nair D. K.
    Comparing Genetic Algorithm and Guided Local Search Methods by Symmetric TSP Instances.
    10th ACM Genetic and Evolutionary Computation Conference (GECCO), pp. 1131-1132, Atlanta, USA, 2008.

  17. Nojoumian M. and Lethbridge T. C.
    Extracting Document Structure to Facilitate a Knowledge Base Creation for the UML Superstructure Specification.
    4th IEEE International Conference on Info Technology: New Generations (ITNG), pp. 393-400, Las Vegas, USA, 2007.

  18. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks.
    3rd International Conference on E-Business (ICE-B): Part of ICETE, pp. 257-264, Setubal, Portugal, 2006.
    Acceptance Rate: 98/326: 30% also Selected as a Best Paper

  19. Nojoumian M. and Tran T.
    Computational Politics and Economy for the Establishment of an Integrated Intelligent Government.
    19th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 332-336, Ottawa, Canada, 2006.

  20. Nojoumian M.
    Vulnerability of the Distributed Computing Systems.
    1st AO Conference: Science and Technology (AOCST), vol. 10, pp. 1-10, Tehran, Iran, 2000.
PhD & MSc Theses
  1. Nojoumian M.
    Novel Secret Sharing and Commitment Schemes for Cryptographic Applications.
    PhD Thesis, David R. Cheriton School of Computer Science, University of Waterloo, Canada, 2012.

  2. Nojoumian M.
    Document Engineering of Complex Software Specifications.
    MSc Thesis, School of Electrical Engineering and Computer Science, University of Ottawa, Canada, 2007.
Invited Talk   ^
Service   ^
Miscellaneous   ^
This web page has been accessed View Statistics times since the beginning of 2007
Last update: May 07, 2017