National Repository of Grey Literature 30 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
NFC technology and its security
Mertlík, Tomáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchange) data format, used for data transmitting. The next chapter is focusing on the analysis of the NFC vulnerability. It contains a possible attacks methods and solutions how to prevent them. The output of this paper is the projection and creation of an application, which allow sending an arbitrary data between two devices using the NFC technology. Additional Bluetooth technology can be used for larger files. In this case, NFC helps to create Bluetooth communication channel which is utilized for data transfer.
The use of artificial intelligence in cryptography
Lavický, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Goal of this thesis is to get familiar with problematics of neural networks and commonly used security protocols in cryptography. Theoretical part of the thesis is about neural networks theory and chooses best suitable type of neural network to use in cryptographic model. In practical part, a new type of security protocol is created, using chosen neural network.
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.
Backup of documents in goverment information systems
Starosta, Martin ; Babnič, Patrik (referee) ; Burda, Karel (advisor)
The thesis is focused on backup documents in the public administration information systems. First chapters of thesis are devoted to general theories of backup files and databases. Next is described storage media what is used for backups, their advantages and disadvantages. Afterwards are described the most common backup strategies and rotation scheme. Thesis is devoted after that to analysis of a representative information system that is used to publish documents to the public. Based on information obtained from analysis is selected optimal backup strategy and this strategy is implemented and tested in designed application.
Potential application of neural networks in network elements
Babnič, Patrik ; Vymazal, Michal (referee) ; Vychodil, Petr (advisor)
The goal was to get acquainted with the problems of network elements to describe neural networks that can be used to manage such a feature. The theoretical part deals with the neural networks from their inception to the present. It focuses mainly on the network, witch can be used for management control. These are the two network: Hopfield network and Kohonen network. The practical part deals with the network element model and ist implementation. It contains a practical element model using a neural network, witch is controlled by a network element.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Progressive Usage of Neural Networks in Telecommunication
Babnič, Patrik ; Kacálek, Jan (referee) ; Škorpil, Vladislav (advisor)
The main task of the Master Thesis is introduction into network elements in converget networks. Great importance is put on network elements today, that is why priority resolving is crucial. Theorethical part deals with network elements and neuron networks. Neuron networks were analysed from history to present. The main goal was to develop a neuron network topology able to manage a network element. The developed topology consists of four-layered perceptron network with four inputs and one output. The simulation was carried out on MATLAB software. No real data were used in the simulation. All input values were generated by MATLAB software hence it was a simulation.
Security camera system CCTV
Mlčoch, Vladimír ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Nowadays the cameras are an important part of security systems. They are everywhere and affect our lives every day. The task of my bachelor thesis was to learn about this camera system, describe its parts and function as a whole. Understanding the theoretical basics of this issue is crucial for solution of bachelor thesis and the laboratory task. In the first part I focuse on the history and description of older systems and the gradual evolution to the modern ones. The second part analyzes the different components of a CCTV system and try to understand their functionality. In the third part i create laboratory task that aims to teach students about the modern technologies and options used in digital camera systems CCTV.

National Repository of Grey Literature : 30 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.