National Repository of Grey Literature 273 records found  beginprevious120 - 129nextend  jump to record: Search took 0.02 seconds. 
Analýza biometrických autentizačních mechanismů smartphonů
PRAŽÁK, Daniel
The thesis deals with the design and implementation of methods for the purpose of analyzing the most widespread authentication biometric mechanisms in smartphones. The theoretical part of the work acquaints the reader to the issue of biometric authentication mechanisms and concerns the available technologies used in smartphones. The practical part includes design and testing of described methods on fingerprint readers and face recognition functions in smartphones with operating systems Android and iOS. In conclusion, the success of the analysis and the level of security of the tested sensors are evaluated.
Cloud Service Access Control using Smart Cards
Muzikant, Petr ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Využití osobních čipových karet pro autentizaci do webových služeb – jako je cloudové úložiště – není triviální kvůli nedostatku open-source implementací, standardizací a dokumentace. Tato práce zkoumá možnosti takové operace a nabízí řešení založené na estonské sadě nástrojů Web-eID. Hlavním účelem tohoto projektu je umožnit komunikaci státem vydávaných elektronických průkazů totožnosti s webovými službami, ale díky své rozšiřitelnosti a open-source licenci je vhodný i pro obecné webové aplikace a vlastní, personalizované čipové karty. Výstupem této diplomové práce je rozšíření projektu v podobě velmi žádané nové knihovny pro validaci autentizačních tokenů pro jazyk PHP, dále instalovatelná Nextcloud aplikace umožňující dvoufaktorovou autentizaci s Web-eID, a také nový JavaCard applet, plně kompatibilní s Web-eID. V práci jsou rovněž prezentovány výsledky implementace s vyvinutým open-source JavaCard appletem a vyhodnocení potenciálu využití českých elektronických občanských průkazů se systémem Web-eID pro snadnější a rychlejší nasazení v budoucnu. Dodatečným cílem práce je také výpomoc vývojářům implementovat tuto silnou autentizační metodu do jejich webových aplikačních služeb, aniž by museli být odkázáni na státní, proprietární či nemoderní řešení.
Decentralized Autentication System Based on Blockchain
Mračna, Štefan ; Malinka, Kamil (referee) ; Januš, Filip (advisor)
This work studies the effects of the integration of blockchain technologies into authentication systems, specifically biometric authentication systems for unlocking doors. The work analyzes different blockchain and authentication technologies and determines which of these technologies are appropriate for this purpose. The work also compares centralized and decentralized authentication systems. A decentralized authentication system which includes blockchain technologies is then proposed and a simplified version of the system (where individual devices in the system are represented by processes) is implemented. Testing of effectiveness, security, reliability and memory usage is then conducted under different conditions.
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
Data archiving using blockchain technology
Řihánek, Tobiáš ; Sikora, Marek (referee) ; Člupek, Vlastimil (advisor)
This thesis dealt with the issue of data archiving. The aim was to explore the possibilities of using blockchain technology to address the security aspects of digital archiving, and then to design and implement an application that uses blockchain to secure data integrity. First, a theoretical analysis of both archiving and blockchain technology was conducted. Next, a web application was designed that uses this technology to detect integrity breaches. Based on the design, a system consisting of a web application written in JavaScript and an archiving application and a validation application written in Java was implemented. These applications communicate with each other and create a secure archiving system using blockchain. The functionality of the system was demonstrated and its security was tested.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá implementací a vytvořením kryptografické knihovny a grafického uživatelského rozhraní (GUI) pro nově navržený protokol "Smlouva o autentizačním klíči na základě Shamirova sdílení tajemnství" (ang. "Shamir’s Secret Sharing-based Authenticated Key Agreement", zkráceně ShSSAKA). Protokol je založený na principu AKA (autentizovaná domluva klíče), Schnorrově podpisu a rozšířen Paillierovým schématem pro možnost podílení se více zařízení na podpisu a autentizaci. Prezentovány jsou také benchmarky na osobním počítači a RaspberryPi.
Access control system using multilevel authentication
Cvrček, Tadeáš ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
The master's thesis focuses on authenticated key agreement protocols and their implementation on MultOS smart cards platform and devices running Google Android operating system. Implemented applications use NFC (Near Field Communication) interface for communication with cellphone, Bluetooth technology for communication with smart watch and smart card as SAM (Secure Access Module) module in a verifier role. The source code is universal, so it is possible to use it in other projects.
Selected problems of the czech media and journalistic profession on the exemple of the intrusion of fictitious events and news satire into official news
Seidlová, Tereza ; Škodová, Markéta (advisor) ; Bednařík, Petr (referee)
This diploma thesis focuses on the problematic aspects of the journalistic profession nowadays, namely on the example of the penetration of the mystifying jokes to the mainstream media. In three specific cases where the authors of the mystifying pranks managed to penetrate the media, the work illustrates the most common mistakes journalists can make and focuses on trends, which stand for these tendencies. Part of this work is the analysis of the mystifying contents that appeared on jokes websites, on Facebook or in the context of interpersonal communication, and subsequent analysis of the media in which these mystifying reports appeared in the form of the real events. The interviews with both stakeholders - authors of the hoax contents and media representatives - will subsequently serve for the illustration of the overall issue and the final conclusion.
Signature-based User Authentication
Hámorník, Juraj ; Jančík, Pavel (advisor) ; Moško, Juraj (referee)
This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Signatures similarity is calculated by dynamic time warp on dynamic signature features such as speed, acceleration and pressure. User access token is used by our Windows login plugin called signature credential provider to decrypt user credentials and perform log in. Result of this work is solution that allow user log to windows by handwritten signatures, with equal error rate of 4.17\%.
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Beran, Karel (advisor) ; Cvrček, František (referee) ; Polčák, Radim (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...

National Repository of Grey Literature : 273 records found   beginprevious120 - 129nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.