dc.contributor.author |
Zantout, Bassam |
|
dc.date.accessioned |
2011-10-06T12:29:38Z |
|
dc.date.available |
2011-10-06T12:29:38Z |
|
dc.date.copyright |
2008 |
en_US |
dc.date.issued |
2011-10-06 |
|
dc.date.submitted |
2008-11-20 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/700 |
|
dc.description |
Includes bibliographical references (leaves 163-166). |
en_US |
dc.description.abstract |
The aim of this research is to present a historical background of security techniques for
avoiding traffic analysis as well as assuring data integrity throughout different
implementations, theories, and real life scenarios that various scientists and engineers
have researched and implemented previously.
The thesis also introduces a new technique for assuring data integrity while avoiding
traffic analysis and other types of similar attacks (eg: man-in-the-middle, data source
fingerprinting, etc.). The new technique utilizes a quorum based approach to allow the
client to validate the authenticity of the received data at his/her end by comparing
different copies of the data in addition to standard identification techniques currently
being used. The technique also accomplishes data transfer from source to destination
using a distributed system, encryption, and a relatively new way for communication
amongst system components. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Computer networks -- Security measures |
en_US |
dc.subject |
Computer security |
en_US |
dc.subject |
Data protection |
en_US |
dc.title |
Avoiding traffic analysis and assuring data integrity using a quorum-based approach. (c2008) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Fall |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.idnumber |
199812550 |
en_US |
dc.author.commembers |
Dr. Faisal Abu Khzam |
|
dc.author.commembers |
Dr. Sanaa Sharafeddine |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: vii, 175 leaves; ill. (some col.); 30 cm. Available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi A. Haraty |
|
dc.identifier.doi |
https://doi.org/10.26756/th.2008.22 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |