Towards inconspicuous security
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...
Main Author: | Goh, Weihan |
---|---|
Other Authors: | Yeo Chai Kiat |
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/54997 |
Similar Items
-
Threat mitigation in tactical-level disruption tolerant networks
by: Goh, Weihan, et al.
Published: (2013) -
Inconspicuous Penis
by: Arun K. Srinivasan, et al.
Published: (2011-01-01) -
Towards security and privacy for emerging wireless networks
by: Pham, Thi Ngoc Diep
Published: (2016) -
Inconspicuous data augmentation based backdoor attack on deep neural networks
by: Xu, Chaohui, et al.
Published: (2023) -
Towards trusted and secure communications in a vehicular environment
by: Tan, Heng Chuan
Published: (2017)