dc.contributor.authorGoh, Weihan
dc.date.accessioned2013-11-28T04:33:30Z
dc.date.accessioned2017-07-23T08:29:55Z
dc.date.available2013-11-28T04:33:30Z
dc.date.available2017-07-23T08:29:55Z
dc.date.copyright2013en_US
dc.date.issued2013
dc.identifier.citationGoh, W. (2013). Towards inconspicuous security. Doctoral thesis, Nanyang Technological University, Singapore.
dc.identifier.urihttp://hdl.handle.net/10356/54997
dc.description.abstractThis dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme.en_US
dc.format.extent206 p.en_US
dc.language.isoenen_US
dc.subjectDRNTU::Engineering::Computer science and engineeringen_US
dc.titleTowards inconspicuous securityen_US
dc.typeThesis
dc.contributor.researchCentre for Multimedia and Network Technologyen_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.contributor.supervisorYeo Chai Kiaten_US
dc.description.degreeDOCTOR OF PHILOSOPHY (SCSE)en_US


Files in this item

FilesSizeFormatView
thesis.pdf25.25Mbapplication/pdfView/Open

This item appears in the following Collection(s)

Show simple item record