Towards inconspicuous security

This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...

Full description

Bibliographic Details
Main Author: Goh, Weihan
Other Authors: Yeo Chai Kiat
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/54997
_version_ 1811680854517219328
author Goh, Weihan
author2 Yeo Chai Kiat
author_facet Yeo Chai Kiat
Goh, Weihan
author_sort Goh, Weihan
collection NTU
description This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme.
first_indexed 2024-10-01T03:31:40Z
format Thesis
id ntu-10356/54997
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:31:40Z
publishDate 2013
record_format dspace
spelling ntu-10356/549972023-03-04T00:41:54Z Towards inconspicuous security Goh, Weihan Yeo Chai Kiat School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme. DOCTOR OF PHILOSOPHY (SCSE) 2013-11-28T04:33:30Z 2013-11-28T04:33:30Z 2013 2013 Thesis Goh, W. (2013). Towards inconspicuous security. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/54997 10.32657/10356/54997 en 206 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering
Goh, Weihan
Towards inconspicuous security
title Towards inconspicuous security
title_full Towards inconspicuous security
title_fullStr Towards inconspicuous security
title_full_unstemmed Towards inconspicuous security
title_short Towards inconspicuous security
title_sort towards inconspicuous security
topic DRNTU::Engineering::Computer science and engineering
url https://hdl.handle.net/10356/54997
work_keys_str_mv AT gohweihan towardsinconspicuoussecurity