National Repository of Grey Literature 274 records found  beginprevious124 - 133nextend  jump to record: Search took 0.01 seconds. 
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
Data archiving using blockchain technology
Řihánek, Tobiáš ; Sikora, Marek (referee) ; Člupek, Vlastimil (advisor)
This thesis dealt with the issue of data archiving. The aim was to explore the possibilities of using blockchain technology to address the security aspects of digital archiving, and then to design and implement an application that uses blockchain to secure data integrity. First, a theoretical analysis of both archiving and blockchain technology was conducted. Next, a web application was designed that uses this technology to detect integrity breaches. Based on the design, a system consisting of a web application written in JavaScript and an archiving application and a validation application written in Java was implemented. These applications communicate with each other and create a secure archiving system using blockchain. The functionality of the system was demonstrated and its security was tested.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá implementací a vytvořením kryptografické knihovny a grafického uživatelského rozhraní (GUI) pro nově navržený protokol "Smlouva o autentizačním klíči na základě Shamirova sdílení tajemnství" (ang. "Shamir’s Secret Sharing-based Authenticated Key Agreement", zkráceně ShSSAKA). Protokol je založený na principu AKA (autentizovaná domluva klíče), Schnorrově podpisu a rozšířen Paillierovým schématem pro možnost podílení se více zařízení na podpisu a autentizaci. Prezentovány jsou také benchmarky na osobním počítači a RaspberryPi.
Access control system using multilevel authentication
Cvrček, Tadeáš ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
The master's thesis focuses on authenticated key agreement protocols and their implementation on MultOS smart cards platform and devices running Google Android operating system. Implemented applications use NFC (Near Field Communication) interface for communication with cellphone, Bluetooth technology for communication with smart watch and smart card as SAM (Secure Access Module) module in a verifier role. The source code is universal, so it is possible to use it in other projects.
Selected problems of the czech media and journalistic profession on the exemple of the intrusion of fictitious events and news satire into official news
Seidlová, Tereza ; Škodová, Markéta (advisor) ; Bednařík, Petr (referee)
This diploma thesis focuses on the problematic aspects of the journalistic profession nowadays, namely on the example of the penetration of the mystifying jokes to the mainstream media. In three specific cases where the authors of the mystifying pranks managed to penetrate the media, the work illustrates the most common mistakes journalists can make and focuses on trends, which stand for these tendencies. Part of this work is the analysis of the mystifying contents that appeared on jokes websites, on Facebook or in the context of interpersonal communication, and subsequent analysis of the media in which these mystifying reports appeared in the form of the real events. The interviews with both stakeholders - authors of the hoax contents and media representatives - will subsequently serve for the illustration of the overall issue and the final conclusion.
Signature-based User Authentication
Hámorník, Juraj ; Jančík, Pavel (advisor) ; Moško, Juraj (referee)
This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Signatures similarity is calculated by dynamic time warp on dynamic signature features such as speed, acceleration and pressure. User access token is used by our Windows login plugin called signature credential provider to decrypt user credentials and perform log in. Result of this work is solution that allow user log to windows by handwritten signatures, with equal error rate of 4.17\%.
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Beran, Karel (advisor) ; Cvrček, František (referee) ; Polčák, Radim (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Tryzna, Jan (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Relevance of Usable Security Guidelines from IT Professional Point of View
Galanská, Katarína ; Polčák, Libor (referee) ; Malinka, Kamil (advisor)
Vyvážení bezpečnosti a použitelnosti bylo vždy výzvou. Navzdory důležitosti zabezpečení softwaru jsou bezpečnostní pokyny a standardy často příliš komplikované, náchylné k chybám nebo časově náročné. Tato nerovnováha iniciovala vznik pojmu použitelné bezpečnosti. Po celá léta to byl běžný výzkumný problém. Zatímco softvér by měl být vyvíjen s ohledem na použitelnost koncových uživatelů, bezpečnostním standardům a směrnicím, které používají IT profesionálové, není z hlediska použitelnosti často věnována dostatečná pozornost. Vzhledem k tomu, že se od odborníků v oblasti IT očekává vyšší úroveň znalostí, často čelí velmi složitým oblastem, když se snaží vyhovět konkrétním bezpečnostním standardům nebo dodržovat konkrétní pokyny. Tato práce představuje studium současného povědomí v oblasti použitelné bezpečnosti. Práce sestává z provedeného průzkumu, analýzy stávajících použitelných bezpečnostních pokynů a navrhuje vzdělávací pomůcku k řešení problémů, které výzkum přinesl. Hodnocení vzdělávací pomůcky ukázalo pozitivní dopad na povědomí IT odborníků.
Authorization and Authentication Solutions on the Java Platform
Geffert, Maroš ; Rychlý, Marek (referee) ; Burget, Radek (advisor)
The aim of this work is to analyze the current authentication and authorization libraries on the Java platform and create a web application that supports user authentication, including multi-phase authentication (MFA), user and group authorization and is resistant to the most common attacks. I performed an analysis of existing solutions and based on best practises, I created my own solution. As an implementation language I used Java 11 and libraries Spring Framework, Spring Security, MyBatis and a tool for sending HTTP queries Postman. The implemented service satisfy the set criteria, while I tested the functionality of the proposed solutions and the time-consuming process of access control.

National Repository of Grey Literature : 274 records found   beginprevious124 - 133nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.