.

Avoiding traffic analysis and assuring data integrity using a quorum-based approach. (c2008)

LAUR Repository

Show simple item record

dc.contributor.author Zantout, Bassam
dc.date.accessioned 2011-10-06T12:29:38Z
dc.date.available 2011-10-06T12:29:38Z
dc.date.copyright 2008 en_US
dc.date.issued 2011-10-06
dc.date.submitted 2008-11-20
dc.identifier.uri http://hdl.handle.net/10725/700
dc.description Includes bibliographical references (leaves 163-166). en_US
dc.description.abstract The aim of this research is to present a historical background of security techniques for avoiding traffic analysis as well as assuring data integrity throughout different implementations, theories, and real life scenarios that various scientists and engineers have researched and implemented previously. The thesis also introduces a new technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (eg: man-in-the-middle, data source fingerprinting, etc.). The new technique utilizes a quorum based approach to allow the client to validate the authenticity of the received data at his/her end by comparing different copies of the data in addition to standard identification techniques currently being used. The technique also accomplishes data transfer from source to destination using a distributed system, encryption, and a relatively new way for communication amongst system components. en_US
dc.language.iso en en_US
dc.subject Computer networks -- Security measures en_US
dc.subject Computer security en_US
dc.subject Data protection en_US
dc.title Avoiding traffic analysis and assuring data integrity using a quorum-based approach. (c2008) en_US
dc.type Thesis en_US
dc.term.submitted Fall en_US
dc.author.degree MS in Computer Science en_US
dc.author.school Arts and Sciences en_US
dc.author.idnumber 199812550 en_US
dc.author.commembers Dr. Faisal Abu Khzam
dc.author.commembers Dr. Sanaa Sharafeddine
dc.author.woa OA en_US
dc.description.physdesc 1 bound copy: vii, 175 leaves; ill. (some col.); 30 cm. Available at RNL. en_US
dc.author.division Computer Science en_US
dc.author.advisor Dr. Ramzi A. Haraty
dc.identifier.doi https://doi.org/10.26756/th.2008.22 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account