Please use this identifier to cite or link to this item:
Title: Towards inconspicuous security
Authors: Goh, Weihan.
Keywords: DRNTU::Engineering::Computer science and engineering
Issue Date: 2013
Source: Goh, W. (2013). Towards inconspicuous security. Doctoral thesis, Nanyang Technological University, Singapore.
Abstract: This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Theses

Files in This Item:
File Description SizeFormat 
thesis.pdfThesis24.67 MBAdobe PDFThumbnail

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.