National Repository of Grey Literature 140 records found  beginprevious126 - 135next  jump to record: Search took 0.01 seconds. 
Bluetooth device security testing
Hlaváček, Jan ; Martinásek, Zdeněk (referee) ; Dzurenda, Petr (advisor)
The aim of the thesis is analysis and inventory security risks of Bluetooth technology, assembly Bluetooth adapter and proposal and poposal of testing procedures, which will helps evaluate security of tested device.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
The prevention of cyberbullying
Škunda, Patrik ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The main objective of the bachelor thesis is to create a mobile application for Android devices, which has a playful way to instruct the user about the potential dangers of the Internet and thus the prevention of cyberbullying. The first chapter is about the issue of cyberbullying, describes the characteristics, methods, tools and impacts. The next chapter describes how to protect internet user to avoid becoming a victim of cyber-bullying and advices on how to behave when the user is already a victim of cyberbullying. The third chapter is devoted to application design and implementation details. The fourth chapter describes and graphically shows the results of testing applications.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
Trusted long-term digital archive
Mravec, Roman ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor's thesis is focused on problematics of long-term trusted preservation. Security and trustworthiness of electronic documents is one of the main aim of this research. Provides means needed to keep and maintain data integrity, non-repudiation, long-term readibility and legally-binding of electronic documents. Solves time resistant formats for archive data files. Contains design of trusted long-term archive based on valid laws and standards in field of electronic preservation.
Authentication using a device with OS Android
Smíšek, Martin ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
This thesis describes the basics of cryptography including symmetric and asymmetric cryptography. It also looks into methods of authentication, using knowledge of some information, having any object and user specific proportions. The thesis engage in description of modern technologies NFC and BLE and shows, how to develop applications, working with them. It deals with the way of storing data used for cryptography, in the safe way. The access system created in the scope of this thesis, which is using Android powered device as an authentication object and communicating over NFC is described. The system can be divided into two parts. The first part works on the device powered by Android. It creates, resets and saves secret data safely and communicate with the other part. The second part is working in a terminal with connected RFID/NFC card reader. The task of this part is to communicate with the part on the Android device, attached to the reader and saving data of users and chambers centrally on the web server. It also creates logs in the form of text files and upload it to the FTP server.
Data security on operation systems
Konečný, Jakub ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is focused on comparing data security options on various desktop operating systems, user authetication and provided cryptography API for developers. The thesis includes a design and realization of an application for secure data storage by using the selective database encryption.
Web visualisation of cryptographic systems
Sikora, Marek ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This thesis deals with web technologies for interactive visualization of content. It discusses the new HTML5 specification, its animation possibilities using Javascript and their practical application for creating web pages. Furthermore, the work focuses on the development tool Adobe Edge Animate, through which we realize page design. The study also discusses cryptographic systems and protocol HM12. It displays a basic overview of the functionality of this Protocol. In the last part of the thesis describes the actual implementation of these two topics, namely the creation of web visualization – demonstrator of the cryptographic system including a fully operational model.
Monitoring of test station downtime
Šebesta, David ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis is about the monitoring of testing station downtimes at the DS/ETC (Diesel Systems / Engineering Testing Center) Bosh Diesel s.r.o. department in Jihlava. The goal of the monitoring is to get a record and an immediate warning for each machine downtime. The testing engineers are able to edit downtime reports and to create statistics and the Pareto analysis based on the reports. In the beginning of the thesis there are generally described the ETC department and the SCADA system. The monitoring system is designed and implemented based on the requirements of the ETC department. SMS messages sent via a GSM module what is connected directly to the server are used for immediate downtime warning. The test engineers have the graphic user interface what they can use to edit downtime reports. Statistics are generated individually based on the adjustable data filter. The department can focus primary on the finding out the reasons of the downtimes what leads to the biggest reduction of the test machine downtimes.
Data transmition security with general linear block codes
Dzurenda, Petr ; Tejkal, Vladimír (referee) ; Němec, Karel (advisor)
This work deals with problematic basic characteristic common linear block codes, concretely with creation generating and controlling matrix and individual ways decoding common linear block codes and then are theoretic knowledge used in the next part bachelor’s thesis. Next part this work is bent on the concrete layout of common liner block code satisfactory specifications by submission. In this part it can by find way haw create generating matrix be able to correcting tree single errors then create control matrix for decoding and correct network for correcting errors. Programs are used in this work are explained there. In the end this part is example of coding and decoding. Lastly work is realization codec. In this part is description of coder and decoder realizations. This codec is simulating by program Matlab Simulink in part five. In last part are create boards of printed circuits by program Eagle for coder and decoder.

National Repository of Grey Literature : 140 records found   beginprevious126 - 135next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.