Browsing by Degree Name "Master of Cyber Security (MCS)"

Now showing items 1-6 of 6

  • Detecting relay attacks against Bluetooth communications on Android

    Symon, Jeremy (The University of Waikato, 2018)
    The widespread usage of mobile devices has lead to mobile devices being used to replace existing solutions, including smart cards for authentication in access control systems. While this can be convenient, there are security ...
  • Key factors in building a Secure Web Gateway

    Yeh, Jeffrey (University of Waikato, 2017)
    A Secure Web Gateway, according to Gartner’s definition, is a solution that provides URL filtering, malicious code detection and blocking, and application controls for cloud applications to filter out objectionable ...
  • Progger 3: A low-overhead, tamper-proof provenance system

    Corrick, Tristan James Carlile (The University of Waikato, 2021)
    Data provenance, which describes how data is accessed and used since the time it is created, is a valuable resource with a wide range of uses. It can be used simply to know who has accessed one's data, or be used in more ...
  • Secure Storage Guideline for Android Devices

    de Feijter, Sjoerd (University of Waikato, 2016)
    The sudden surge in the mobile market has given developers the ability to create applications that reach millions of potential users. Many applications store sensitive data, which makes them potential targets for malicious ...
  • The Waikato Data Privacy Matrix

    Scoon, Craig (University of Waikato, 2017)
    Data privacy is an expected right of most citizens around the world, but there are many legislative challenges within boundary-less cloud computing and World Wide Web environments. Despite its importance, there is limited ...
  • User-centric Visualization of Data Provenance

    Garae, Jeffery (University of Waikato, 2015)
    The need to understand and track files (and inherently, data) in cloud computing systems is in high demand. Over the past years, the use of logs and data representation using graphs have become the main method for tracking ...