Towards inconspicuous security

This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...

Full description

Saved in:
Bibliographic Details
Main Author: Goh, Weihan
Other Authors: Yeo Chai Kiat
Format: Theses and Dissertations
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/54997
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-54997
record_format dspace
spelling sg-ntu-dr.10356-549972023-03-04T00:41:54Z Towards inconspicuous security Goh, Weihan Yeo Chai Kiat School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme. DOCTOR OF PHILOSOPHY (SCSE) 2013-11-28T04:33:30Z 2013-11-28T04:33:30Z 2013 2013 Thesis Goh, W. (2013). Towards inconspicuous security. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/54997 10.32657/10356/54997 en 206 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Goh, Weihan
Towards inconspicuous security
description This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme.
author2 Yeo Chai Kiat
author_facet Yeo Chai Kiat
Goh, Weihan
format Theses and Dissertations
author Goh, Weihan
author_sort Goh, Weihan
title Towards inconspicuous security
title_short Towards inconspicuous security
title_full Towards inconspicuous security
title_fullStr Towards inconspicuous security
title_full_unstemmed Towards inconspicuous security
title_sort towards inconspicuous security
publishDate 2013
url https://hdl.handle.net/10356/54997
_version_ 1759853994955505664