Towards inconspicuous security
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/54997 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-54997 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-549972023-03-04T00:41:54Z Towards inconspicuous security Goh, Weihan Yeo Chai Kiat School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme. DOCTOR OF PHILOSOPHY (SCSE) 2013-11-28T04:33:30Z 2013-11-28T04:33:30Z 2013 2013 Thesis Goh, W. (2013). Towards inconspicuous security. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/54997 10.32657/10356/54997 en 206 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Goh, Weihan Towards inconspicuous security |
description |
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme. |
author2 |
Yeo Chai Kiat |
author_facet |
Yeo Chai Kiat Goh, Weihan |
format |
Theses and Dissertations |
author |
Goh, Weihan |
author_sort |
Goh, Weihan |
title |
Towards inconspicuous security |
title_short |
Towards inconspicuous security |
title_full |
Towards inconspicuous security |
title_fullStr |
Towards inconspicuous security |
title_full_unstemmed |
Towards inconspicuous security |
title_sort |
towards inconspicuous security |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/54997 |
_version_ |
1759853994955505664 |