Comprehensive survey on privacy-preserving protocols for sealed-bid auctions

R Alvarez, M Nojoumian - Computers & Security, 2020 - Elsevier
The internet is a ubiquitous technology that has changed conventional human interactions.
In our present time, it is not unusual for financial transactions to take place virtually with …

Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm

M Nojoumian, A Golchubian, L Njilla, K Kwiat… - … : Proceedings of the …, 2019 - Springer
The mining process in the Blockchain is very resource intensive, therefore, miners form
coalitions to verify each block of transactions in return for a reward where only the first …

Sequential secret sharing as a new hierarchical access structure

M Nojoumian, DR Stinson - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Due to the rapid growth of the next generation networking and system technologies,
computer networks require new design and management. In this context, security, and more …

Combinatorial repairability for threshold schemes

DR Stinson, R Wei - Designs, Codes and Cryptography, 2018 - Springer
In this paper, we consider methods whereby a subset of players in a (k, n)-threshold scheme
can “repair” another player's share in the event that their share has been lost or corrupted …

A survey and refinement of repairable threshold schemes

TM Laing, DR Stinson - Journal of Mathematical Cryptology, 2018 - degruyter.com
We consider repairable threshold schemes (RTSs), which are threshold schemes that
enable a player to securely reconstruct a lost share with help from their peers. We …

Rational trust modeling

M Nojoumian - Decision and Game Theory for Security: 9th …, 2018 - Springer
Trust models are widely used in various computer science disciplines. The primary purpose
of a trust model is to continuously measure the trustworthiness of a set of entities based on …

[PDF][PDF] Trust, influence and reputation management based on human reasoning

M Nojoumian - Workshops at the Twenty-Ninth AAAI Conference on …, 2015 - cdn.aaai.org
Understanding trust, influence and reputation and constructing computational models of
these notions are two essential scientific challenges in computer science as well as social …

Secure trust evaluation using multipath and referral chain methods

MG Raeini, M Nojoumian - … City, Luxembourg, September 26–27, 2019 …, 2019 - Springer
The notions of trust and reputation have been well studied and integrated into computer
networks and internet-based services, eg, Amazon and eBay websites. Using trust and …

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques

M Nojoumian - 2016 14th Annual Conference on Privacy …, 2016 - ieeexplore.ieee.org
In this paper, a new proactive verifiable secret sharing (PVSS) scheme is proposed in an
active mobile adversary setting. To the best of our knowledge, the only unconditionally …

A Multi‐Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles

J Wu, X Chen, L Zhang, S Zhou… - Security and …, 2022 - Wiley Online Library
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in
developing smart cities and smart transportation. One way to achieve that is based on the …