National Repository of Grey Literature 123 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Analýza biometrických mechanismů smartphonů
PRAŽÁK, Daniel
The thesis deals with the design and implementation of methods for the purpose of analyzing fingerprint sensors in smartphones. The theoretical part of the work acquaints the reader to the issue of biometric authentication mechanisms and concerns the available technologies used in smartphones. The practical part includes design and testing of described methods on smartphones with operating systems Android and iOS. In conclusion, the success of the analysis and the level of security of the tested sensors are evaluated.
Quantum-Resistant Cryptographic Application For Secure Data Storage On Os Android
Michalec, Pavol
Data security is an essential part of many Android OS applications. This paper presents a secure implementations including Post-Quantum Cryptographic (PQC) protocols that are going to be very important in the near future with the development of quantum computers.
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Beran, Karel (advisor) ; Cvrček, František (referee) ; Polčák, Radim (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Application of stable isotope techniques for verifying the geographical origin of endangered plants and animals subject to international trade
Kopecká, Ivana ; Jandová, Kateřina (advisor) ; Horká, Petra (referee)
Elements in nature can exist in several versions, which differ in the amount of neutrons in the nucleus. These modifications are called isotopes. Neutrons have a neutral charge, but do not have a zero weight, therefore isotopes of a single element are differ in weight. Thanks to the sensitive analytical methods, we can discern that the isotope in the sample is contained in what quantity (mass spectrometry is used, from which to retrieve the ratio of stable isotopes in a sample). This can be used in many fields, such as in geology, food ecology, or discovery of geographic origin. The aim of the thesis is in the published literature to determine the extent to which the method of analysis of stable isotopes usable to verify the geographical origin of endangered species of flora and fauna subject to international trade, especially turtles of the genus Testudo. Turtles of the genus Testudo are protected by CITES treaty, which limits, enables and disables trading in endangered species so as to avoid their extinction caused overexploitation for commercial purpose. However, there is still an illegal trade that the supervising authorities are trying to detect and combat. Key words: traceability, provenance determination, authentication, CITES treaty
Contactless User Authentification Using Leap Motion Sensor
Lukáč, Jakub ; Beran, Vítězslav (referee) ; Najman, Pavel (advisor)
Contactless authentication of users has grown in popularity as a new technology. Recent findings in the field of computer vision and its applications have contributed to the emergence of new devices such as Leap Motion controller. This device is capable of precise recognition of hand positions and simple gestures identification. This paper presents an application of data gathered from controller's interface and using them for user identification. Proposed solution uses hand geometry to evaluate the recognition process where this accessible and inexpensive device can be used. Therefore, the user can easily benefit from this extra feature coming with the new device. To conclude, the results show overall accuracy over 99 % on a relatively small dataset.
Strong Unilateral Authentication of Low-cost Devices Involved in Internet of Things in Smart Homes
Člupek, Vlastimil
In this paper we focused on authentication of low-cost devices involved in Internet of Things (IoT) in smart homes. We proposed a unilateral authentication protocol for authentication of low-cost devices involved in IoT with a Control Unit (CU) of a smart house. The protocol allows secure transmission of secret information between communication entities. Only cryptographic primitives as Hash functions, XOR operations and Physical unclonable functions (PUFs) are necessary for execution of the protocol. Security of the proposed protocol is described.
Company User Authentication Proposal
Klaška, Patrik ; Jordán, Vilém (referee) ; Ondrák, Viktor (advisor)
This thesis is focused on the creation of functional authentication process of users into computer network in company Wistron InfoComm s.r.o. and discusses issues related to this process. The main aim of the thesis is to implement a functional and simultaneously realistic solution based on the company's requirements as well as described problems associated with the implementation of this solution.
Attribute based authentication
Chwastková, Šárka ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis deals with attribute based credentials. It describes attribute systems, their entities and properties generally. The work concentrates specifically on the attribute system Identity Mixer. The process of communication of the attribute system Identity Mixer is implemented in the language of JavaScript. Application is the web visualization, which describes protocols, entities and generally computes protocols of Identity Mixer with inputs of small numbers or predefined large numbers.
Secure Authentication and Key Management in the Internet of Things
Škunda, Patrik ; Fujdiak, Radek (referee) ; Malina, Lukáš (advisor)
This thesis deals with issues of secure authentication and key management in the Internet of Things. It describes basic protocols used in IoT, cryptographic primitives, communication technologies in IoT and end elements. It also includes a measuring the performance of cryptographic primitives on Raspberry Pi and selecting the appropriate LPWAN simulation technology. The conclusion of the work is devoted to the simulation of a LoRaWAN network

National Repository of Grey Literature : 123 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.