National Repository of Grey Literature 273 records found  beginprevious114 - 123nextend  jump to record: Search took 0.01 seconds. 
Authentication Framework for Web Applications
Michalica, David ; Rychlý, Marek (referee) ; Burget, Radek (advisor)
The subject of this work is to create a microservice for user authentication and user account management. The server side implementation is in C# and .NET framework. The user interface is implemented in Javascript using the React library. MySQL database is used for the data layer of the application, but the modular design of the application allows to use any type of database after minor modifications. JWT tokens are used for authentication. The application allows the client to log in using third party accounts, such as an existing Google account.
Blood Vessels Detection in the Fingers Area for Liveness Detection
Šulavík, Jan ; Goldmann, Tomáš (referee) ; Rydlo, Štěpán (advisor)
Biometrics as a part of computer technology are recently rising in popularity and various biometric methods are becoming a part of everyday human life. This work in the first place informs the reader on the basics of biometrics in computer technology and further continues to discuss the use of veins in this area as veins are for their uniqueness considered as an ideal human physiological trait for use in biometrics. It is described in what manner is this biometric characteristic being captured. Further more the work describes some image processing methods for extracting biometric data from the input images that are later used. These methods were also implemented and the details of this implementation are to be found later in the text. In the last part the suggested methods of blood vessel detection are tested and the results evaluated.
Industrial device authentication system using blockchain
Hnátek, Michal ; Holasová, Eva (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis deals primarily with industrial networks and blockchain. Current implementations of network security are enumerated. A large part is devoted to the analysis of consensus algorithms and their suitability for industrial networks. The work also includes an extensive comparison of libraries for blockchain creation. In the area of industrial networks, the Modbus protocol is represented. The general function of blockchain and its modifications for use in industrial private networks are described. The creation of a private blockchain with the Proof of Authority consensus algorithm using the go-ethereum library is described, as well as the creation of a smart contract for a given blockchain.
Access control system for carsharing application
Texl, Filip ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is devoted to access systems with an emphasis on carsharing applications, both from a theoretical point of view, where it analyzes their advantages and disadvantages and uses cryptographic primitives, and also from a practical point of view, where the practical part includes the design of an access system and its subsequent implementation. Bluetooth Low Energy technology and Near field communication are also used in the bachelor thesis, which is again described from a theoretical point of view, especially the key concepts of these technologies, as well as its practical use for access systems.
Classroom student identification using passwordless authentication
Kamenská, Veronika ; Kurečka, Radomír (referee) ; Travěnec, Jiří (advisor)
This thesis deals with the passwordless authentication of a Masaryk University student within the Simulation Centre of the Faculty of Medicine. In the introduction the concepts of authentication, passwordless authentication, multifactor authentication are explained. Subsequently, these methods are compared with respect to security and the most optimal method suitable for implementation in teaching is selected. A mobile application was created in Flutter environment which will be used by the students for authentication. At the same time, an algorithm was designed to test the application in practice. A pilot testing was carried out focused on the real deployment of the application in the teaching of the Masaryk University Simulation Centre. The results of this testing were then statistically evaluated.
Study of the chemical profile of wine of Riesling variety
Šumberová, Michaela ; Trachtová, Štěpánka (referee) ; Vítová, Eva (advisor)
This diploma thesis focuses on the chemical profile and authentication of the geographical origin of varietal wine Rhine Riesling obtained from 4 Moravian wine regions. In the experiment, 20 wine samples were analysed with 5 instrumental analytical methods – aromatic compounds were determined by HS-SPME-GC-MS, phenolic compounds by HPLC-MS, total phenolic content by MAS, and elemental analysis by ICP-OES and ICP-MS. In total 36 aromatic compounds were detected, from which 7 were varietal terpenes and 2 of them C13 norisoprenoids. The total phenolic content for the Rhine Riesling wine was measured in the concentration range of 174,22–380,96 mg·l-1. Gallic acid (0,41–34,99 mg·l-1), catechin (0,05–7,44 mg·l-1), epicatechin (0,03–4,14 mg·l-1), caffeic acid (0,14–2,05 mg·l-1), and coumaric acid (0,30–4,04 mg·l-1) were the specific measured phenolics. In total 18 elements were measured in Rhine Riesling wine, macroelements K > P > Mg > Ca > Na with concentrations above 10 mg·l-1, microelements Al > Fe > Zn > Mn > Sr > Cu in the concentration range 0,1–10 mg·l-1, and trace elements Ni > Cr > V > Pb > Mo > Co > Cd in the concentration 0,0001–1 mg·l-1. Potassium was the most abundant element (386,37 mg·l-1). The results were used for the parametric and nonparametric univariate analysis of variance (ANOVA) and multivariate principal component analysis (PCA). Ni60 (p = 0,0029), ethyl benzoate (p = 0,0060), and diethyl succinate (p = 0,0247) were statistically the most significant parameters influenced by the wine region for the significance level = 0,05. Out of the 57 measured variables 7 parameters were identified as statistically significant and used for PCA graphic representation of the samples. PCA results show, that the varietal wine’s origin can be authenticated by chosen chemical compounds and chemometric methods.
Analýza biometrických autentizačních mechanismů smartphonů
PRAŽÁK, Daniel
The thesis deals with the design and implementation of methods for the purpose of analyzing the most widespread authentication biometric mechanisms in smartphones. The theoretical part of the work acquaints the reader to the issue of biometric authentication mechanisms and concerns the available technologies used in smartphones. The practical part includes design and testing of described methods on fingerprint readers and face recognition functions in smartphones with operating systems Android and iOS. In conclusion, the success of the analysis and the level of security of the tested sensors are evaluated.
Cloud Service Access Control using Smart Cards
Muzikant, Petr ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Využití osobních čipových karet pro autentizaci do webových služeb – jako je cloudové úložiště – není triviální kvůli nedostatku open-source implementací, standardizací a dokumentace. Tato práce zkoumá možnosti takové operace a nabízí řešení založené na estonské sadě nástrojů Web-eID. Hlavním účelem tohoto projektu je umožnit komunikaci státem vydávaných elektronických průkazů totožnosti s webovými službami, ale díky své rozšiřitelnosti a open-source licenci je vhodný i pro obecné webové aplikace a vlastní, personalizované čipové karty. Výstupem této diplomové práce je rozšíření projektu v podobě velmi žádané nové knihovny pro validaci autentizačních tokenů pro jazyk PHP, dále instalovatelná Nextcloud aplikace umožňující dvoufaktorovou autentizaci s Web-eID, a také nový JavaCard applet, plně kompatibilní s Web-eID. V práci jsou rovněž prezentovány výsledky implementace s vyvinutým open-source JavaCard appletem a vyhodnocení potenciálu využití českých elektronických občanských průkazů se systémem Web-eID pro snadnější a rychlejší nasazení v budoucnu. Dodatečným cílem práce je také výpomoc vývojářům implementovat tuto silnou autentizační metodu do jejich webových aplikačních služeb, aniž by museli být odkázáni na státní, proprietární či nemoderní řešení.
Decentralized Autentication System Based on Blockchain
Mračna, Štefan ; Malinka, Kamil (referee) ; Januš, Filip (advisor)
This work studies the effects of the integration of blockchain technologies into authentication systems, specifically biometric authentication systems for unlocking doors. The work analyzes different blockchain and authentication technologies and determines which of these technologies are appropriate for this purpose. The work also compares centralized and decentralized authentication systems. A decentralized authentication system which includes blockchain technologies is then proposed and a simplified version of the system (where individual devices in the system are represented by processes) is implemented. Testing of effectiveness, security, reliability and memory usage is then conducted under different conditions.
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.

National Repository of Grey Literature : 273 records found   beginprevious114 - 123nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.