National Repository of Grey Literature 129 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Cryptographic Protection of Digital Identity
Dzurenda, Petr ; Švenda,, Petr (referee) ; Castella-Roca, Jordi (referee) ; Hajný, Jan (advisor)
Dizertační práce se zabývá kryptografickými schématy zvyšující ochranu soukromí uživatelů v systémech řízení přístupu a sběru dat. V současnosti jsou systémy fyzického řízení přístupu na bázi čipových karet využívány téměř dennodenně většinou z nás, například v zaměstnání, ve veřejné dopravě a v hotelech. Tyto systémy však stále neposkytují dostatečnou kryptografickou ochranu a tedy bezpečnost. Uživatelské identifikátory a klíče lze snadno odposlechnout a padělat. Funkce, které by zajišťovaly ochranu soukromí uživatele, téměř vždy chybí. Proto je zde reálné riziko možného sledovaní lidí, jejich pohybu a chovaní. Poskytovatelé služeb nebo případní útočníci, kteří odposlouchávají komunikaci, mohou vytvářet profily uživatelů, ví, co dělají, kde se pohybují a o co se zajímají. Za účelem zlepšení tohoto stavu jsme navrhli čtyři nová kryptografická schémata založená na efektivních důkazech s nulovou znalostí a kryptografii eliptických křivek. Konkrétně dizertační práce prezentuje tři nová autentizační schémata pro využití v systémech řízení přístupu a jedno nové schéma pro využití v systémech sběru dat. První schéma využívá distribuovaný autentizační přístup vyžadující spolupráci více RFID prvků v autentizačním procesu. Tato vlastnost je výhodná zvláště v případech řízení přístupu do nebezpečných prostor, kdy pro povolení přístupu uživatele je nezbytné, aby byl uživatel vybaven ochrannými pomůckami (se zabudovanými RFID prvky). Další dvě schémata jsou založena na atributovém způsobu ověření, tj. schémata umožňují anonymně prokázat vlastnictví atributů uživatele, jako je věk, občanství a pohlaví. Zatím co jedno schéma implementuje efektivní revokační a identifikační mechanismy, druhé schéma poskytuje nejrychlejší verifikaci držení uživatelských atributů ze všech současných řešení. Poslední, čtvrté schéma reprezentuje schéma krátkého skupinového podpisu pro scénář sběru dat. Schémata sběru dat se používají pro bezpečný a spolehlivý přenos dat ze vzdálených uzlů do řídící jednotky. S rostoucím významem chytrých měřičů v energetice, inteligentních zařízení v domácnostech a rozličných senzorových sítí, se potřeba bezpečných systémů sběru dat stává velmi naléhavou. Tato schémata musí podporovat nejen standardní bezpečnostní funkce, jako je důvěrnost a autentičnost přenášených dat, ale také funkce nové, jako je silná ochrana soukromí a identity uživatele či identifikace škodlivých uživatelů. Navržená schémata jsou prokazatelně bezpečná a nabízí celou řadu funkcí rozšiřující ochranu soukromí a identity uživatele, jmenovitě se pak jedná o zajištění anonymity, nesledovatelnosti a nespojitelnosti jednotlivých relací uživatele. Kromě úplné kryptografické specifikace a bezpečnostní analýzy navržených schémat, obsahuje tato práce také výsledky měření implementací jednotlivých schémat na v současnosti nejpoužívanějších zařízeních v oblasti řízení přístupu a sběru dat.
Application Development Framework for Peer-to-Peer Collaboration
Hrdina, Jan ; Očenášek, Pavel (referee) ; Rychlý, Marek (advisor)
The thesis deals with the design and implementation of the application framework for the creation of collaborative web editors that enable peer-to-peer collaboration in real time. The thesis summarizes existing approaches for data replication, from which M. Kleppmann's CRDT (conflict-free replicated data type) for JSON is chosen as the most suitable. Using the resulting framework, the created content can be safely shared in groups of peers, where each member can be assigned different permissions. Own communication protocols based on WebRTC, WebSocket and WebCrypto are designed and implemented for P2P connection establishment and subsequent communication. The framework allows to resolve conflicts and work independently without an Internet connection. For a consistent user experience, the library includes a set of user interface elements for managing friends, groups, and other common tasks. The framework is implemented using functional design patterns implemented in the ReasonML language. The functionality of the result is verified by creating an example application of the mind map editor.
DYNAMIC BIOMETRIC SIGNATURE AS AN EFFICIENT TOOL FOR INTERNAL CORPORATE COMMUNICATION
Hortai, František ; Jašek, Roman (referee) ; Dočkal, Jaroslav (referee) ; Dostál, Petr (referee) ; Smejkal, Vladimír (advisor)
The aim of this thesis is to provide comprehensive information on the possibilities of authentication, combination of authentication factors and the integration of this issue into corporate communication. The work focuses on this issue and specifies the possibilities for obtaining authentication information, analyses the authentication methods, identification and authorization. It examines the applicability of biometric technologies, the principle of their functionality, examples of their use, their impact, the advantages and disadvantages they bring. A natural, easy-to-use, convenient tool for effective and secure communication is authentication including the dynamic biometric signature. The issues of the dynamic biometric signature technology and its implementation are examined from a comprehensive perspective involving experiments. The research proved that the dynamic biometric signature can serve as a method for supporting secure corporate communication and reduce authentication risks in companies and for individuals.
Identification and authentication technologies
Miklánková, Zuzana ; Lieskovan, Tomáš (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the analysis of currently available RFID technologies and smart cards. Summarized are types of identification and authentication radio or contact systems. The practical part compares measured RFID functional outputs and describes the implementation of multi-attribute authentication system using RFID technology and smart cards. For example, the authentication system can provide employees with access to the building, necessarily demonstrated by both the smart card and RFID tags.The system also includes user privacy elements, where identity of the user cannot be detected by captured communication.
Implementation of OMG/DDS model and communication analysis
Bučko, Kristián ; Fujdiak, Radek (referee) ; Pokorný, Jiří (advisor)
In bachelor´s thesis there is an introduction of OMG DDS specification, theoretical comparison of three most widespread implementations OpenDDS, Vortex Opensplice and RTI Connext, too. Important differences between data-focused publish-subscribe and object-focused client-server (e.g. CORBA) communication are also described in the thesis, as well as the usefulness of these two types in real-time systems. Implementation of RTI Connext is practically demonstrated on various types in scenarios of unsecured and secured communication where the communications themselves are caught in wireshark. The safety is evaluated in captured transfers. The publisher and subscriber codes were adjusted according to a need of measurement by which a communication latency between various sizes of a message is analyzed. A script in Python programming language was created for processing of timestamps and averaging values. A complete comparison of these scenarios and their graphical visual display are done in the end.
Corporate Identity and Access Management System Architecture Improvement Proposal
Nop, Dominik ; MBA, Igor Gricinko, (referee) ; Ondrák, Viktor (advisor)
The master thesis focuses on assessment of current implementation of identity management system and proposal of a new implementation to increase level of stability and information security in the company, primarily regarding the systems that process financial data. In first part, basic theoretical knowledge related to identity management systems is defined. In second part, an analysis of current system state is performed. Based on this analysis, new organizational and technical solutions are proposed to the company. Finally, an implementation project proposal as well as with risk analysis and economic evaluation is completed in the end of this thesis.
Analýza biometrických mechanismů smartphonů
PRAŽÁK, Daniel
The thesis deals with the design and implementation of methods for the purpose of analyzing fingerprint sensors in smartphones. The theoretical part of the work acquaints the reader to the issue of biometric authentication mechanisms and concerns the available technologies used in smartphones. The practical part includes design and testing of described methods on smartphones with operating systems Android and iOS. In conclusion, the success of the analysis and the level of security of the tested sensors are evaluated.
Quantum-Resistant Cryptographic Application For Secure Data Storage On Os Android
Michalec, Pavol
Data security is an essential part of many Android OS applications. This paper presents a secure implementations including Post-Quantum Cryptographic (PQC) protocols that are going to be very important in the near future with the development of quantum computers.
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Beran, Karel (advisor) ; Cvrček, František (referee) ; Polčák, Radim (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Application of stable isotope techniques for verifying the geographical origin of endangered plants and animals subject to international trade
Kopecká, Ivana ; Jandová, Kateřina (advisor) ; Horká, Petra (referee)
Elements in nature can exist in several versions, which differ in the amount of neutrons in the nucleus. These modifications are called isotopes. Neutrons have a neutral charge, but do not have a zero weight, therefore isotopes of a single element are differ in weight. Thanks to the sensitive analytical methods, we can discern that the isotope in the sample is contained in what quantity (mass spectrometry is used, from which to retrieve the ratio of stable isotopes in a sample). This can be used in many fields, such as in geology, food ecology, or discovery of geographic origin. The aim of the thesis is in the published literature to determine the extent to which the method of analysis of stable isotopes usable to verify the geographical origin of endangered species of flora and fauna subject to international trade, especially turtles of the genus Testudo. Turtles of the genus Testudo are protected by CITES treaty, which limits, enables and disables trading in endangered species so as to avoid their extinction caused overexploitation for commercial purpose. However, there is still an illegal trade that the supervising authorities are trying to detect and combat. Key words: traceability, provenance determination, authentication, CITES treaty

National Repository of Grey Literature : 129 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.