National Repository of Grey Literature 275 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Design of the e-Voting system and its Legal Specifics
Váňa, Vojtěch ; Harašta, Jakub (referee) ; Loutocký, Pavel (advisor)
The thesis focuses on the design of the electronic voting system and its legal specifics. The work focused on the legal aspects of electronic voting, such as voter authentication, data security and guarantee of anonymity of votes. In the theoretical part of the thesis, a survey of the historical development of e-voting and an analysis of the experience of countries that have already implemented this system was conducted. Furthermore, the thesis shows the current situation in the Czech Republic with electronic voting and analyses the relevant legislation related to this issue. The practical part of the thesis contains a concrete proposal for an electronic voting system that combines technological innovations with legal requirements.
Classroom student identification using passwordless authentication
Kamenská, Veronika ; Kurečka, Radomír (referee) ; Travěnec, Jiří (advisor)
This thesis deals with the passwordless authentication of a Masaryk University student within the Simulation Centre of the Faculty of Medicine. In the introduction the concepts of authentication, passwordless authentication, multifactor authentication are explained. Subsequently, these methods are compared with respect to security and the most optimal method suitable for implementation in teaching is selected. A mobile application was created in Flutter environment which will be used by the students for authentication. At the same time, an algorithm was designed to test the application in practice. A pilot testing was carried out focused on the real deployment of the application in the teaching of the Masaryk University Simulation Centre. The results of this testing were then statistically evaluated.
Strong Unilateral Authentication of Low-cost Devices Involved in Internet of Things in Smart Homes
Člupek, Vlastimil
In this paper we focused on authentication of low-cost devices involved in Internet of Things (IoT) in smart homes. We proposed a unilateral authentication protocol for authentication of low-cost devices involved in IoT with a Control Unit (CU) of a smart house. The protocol allows secure transmission of secret information between communication entities. Only cryptographic primitives as Hash functions, XOR operations and Physical unclonable functions (PUFs) are necessary for execution of the protocol. Security of the proposed protocol is described.
A Jabber/XMPP Transport for News via the NNTP Protocol
Halfar, Patrik ; Weiss, Petr (referee) ; Rychlý, Marek (advisor)
This document mention some possibilities of information sharing over computer networks. At the beginning there is described exchange information between group of users by NetNews . Next chapter make short introduction to project Jabber/XMPP and its possibilities. Other part appropriate to possibility combination these services and comment implemented application. There are include descriptions how configure most known Jabber servers for use of this application. There are contain XML schemes of uses files too.
Decentralized Autentication System Based on Blockchain
Mračna, Štefan ; Malinka, Kamil (referee) ; Januš, Filip (advisor)
This work studies the effects of the integration of blockchain technologies into authentication systems, specifically biometric authentication systems for unlocking doors. The work analyzes different blockchain and authentication technologies and determines which of these technologies are appropriate for this purpose. The work also compares centralized and decentralized authentication systems. A decentralized authentication system which includes blockchain technologies is then proposed and a simplified version of the system (where individual devices in the system are represented by processes) is implemented. Testing of effectiveness, security, reliability and memory usage is then conducted under different conditions.
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
Person Identification
Svědiroh, Stanislav ; Honec, Peter (referee) ; Richter, Miloslav (advisor)
This thesis focuses on the person identification based on faces. The aim is to create a working solution of person identification for the authentication purposes utilizing the Microsoft Kinect v2 sensor. It contains a summary of the most used algorithms for facial data description and their comparison. Thesis also proposes a PC program that controls the sensor and collects the facial data, saves them, manages keypoint detection and their comparison.
Attribute based authentication
Chwastková, Šárka ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis deals with attribute based credentials. It describes attribute systems, their entities and properties generally. The work concentrates specifically on the attribute system Identity Mixer. The process of communication of the attribute system Identity Mixer is implemented in the language of JavaScript. Application is the web visualization, which describes protocols, entities and generally computes protocols of Identity Mixer with inputs of small numbers or predefined large numbers.
Hash functions and their usage in user authentication
Piller, Igor ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
This thesis concerns with hash functions and their usage in authentication. It presents basics of hash functions theory and construction elements. In particular the thesis focuses on LMHash, MD4, MD5 and SHA family hash functions, which are compared from the security point of view. The thesis describes in general the most frequently used hash function attacks, points out the weaknesses of current construction and mentions the future perspective of hash functions. Furthermore the thesis outlines the area authentication and describes usage of hash functions in the area. Practical part of the thesis contains an implements of a general authentication framework implemented in programming language C#. The result is client and server applications, in which two selected authentication methods were successfully tested. The result implementation is flexible with respect to the possible future use of other authentication methods.

National Repository of Grey Literature : 275 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.