Mahdi Zamani
University of New Mexico
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mahdi Zamani.
conference on current trends in theory and practice of informatics | 2015
Jared Saia; Mahdi Zamani
Secure multi-party computation (MPC) allows multiple parties to compute a known function over inputs held by each party, without any party having to reveal its private input. Unfortunately, traditional MPC algorithms do not scale well to large numbers of parties. In this paper, we describe several recent MPC algorithms that are designed to handle large networks. All of these algorithms rely on recent techniques from the Byzantine agreement literature on forming and using quorums. Informally, a quorum is a small set of parties, most of which are trustworthy. We describe the advantages and disadvantages of these scalable algorithms, and we propose new ideas for improving practicality of current techniques. Finally, we conduct simulations to measure bandwidth cost for several current MPC algorithms.
computational intelligence and security | 2009
Mahdi Zamani; Mahnush Movahedi; Mohammad Mehdi Ebadzadeh; Hossein Pedram
Most of the security problems in large and distributed information systems are vastly complex. Few research on detection of burgeoning Distributed Denial of Service (DDoS) attacks, leads us to expand our perspectives to a comprehensive architectural approach in which particular issues like arrangement and communication of system components appear. In this paper, many useful ideas from the behaviour of biological immune systems are elicited based on the results of the latest immunological researches, especially Danger Theory. They are applied to create a model for immunization of distributed intrusion detection systems (IDSs) that are resistant to DDoS. Although a general model for various IDSs is proposed and implemented in this research, a particular simulation scenario for detecting DDoS in a wireless sensor network (WSN) is planned as an example to assess the general ability of the proposed model in detecting undesirable events.
Distributed Computing | 2017
Varsha Dani; Valerie King; Mahnush Movahedi; Jared Saia; Mahdi Zamani
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a significant number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a 1/3 fraction of the parties. In the asynchronous environment, we allow the adversary to corrupt less than a 1/8 fraction of parties. For any deterministic function that can be computed by an arithmetic circuit with m gates, both of our protocols require each party to send a number of messages and perform an amount of computation that is
SIROCCO 2015 Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439 | 2015
Mahnush Movahedi; Jared Saia; Mahdi Zamani
foundations of mobile computing | 2014
Mahdi Zamani; Mahnush Movahedi
\tilde{O}(m/n + \sqrt{n})
principles of distributed computing | 2013
Josh R. Karlin; Joud Khoury; Jared Saia; Mahdi Zamani
computer and communications security | 2018
Mahdi Zamani; Mahnush Movahedi; Mariana Raykova
O~(m/n+n). We also show that our protocols provide statistical and universally-composable security. To achieve our asynchronous MPC result, we define the threshold counting problem and present a distributed protocol to solve it in the asynchronous setting. This protocol is load balanced, with computation, communication and latency complexity of
international symposium on stabilization safety and security of distributed systems | 2017
Mahdi Zamani; Jared Saia; Jedidiah R. Crandall
international conference on distributed computing systems | 2015
Mahnush Movahedi; Jared Saia; Mahdi Zamani
O(\log {n})
foundations of computational intelligence | 2013
Mahdi Zamani; Jared Saia; Mahnush Movahedi; Joud Khoury