National Repository of Grey Literature 21 records found  beginprevious12 - 21  jump to record: Search took 0.00 seconds. 
Context-Dependent Scanner
Hatina, Peter ; Koutný, Jiří (referee) ; Čermák, Martin (advisor)
This paper is devoted to principles of a lexical analysis and to a means of context resolution of a lexeme type, depending on its source code position. The lexical analysis, process of a lexical analyzer creation and possible solution for context lexeme recognition, based on a multiple automata system, is described. Lexical analyzer functionality is extended to accept tokens in other languages code blocks.
Multigrammars and Parsing Based on Them
Fiala, Jiří ; Lukáš, Roman (referee) ; Meduna, Alexandr (advisor)
This document deals with introduction focused on pragmatically oriented research at branch of theoretical computer science and with presentation of designed methods for chosen application topics. At this study the theoretical subject is represented by kind of generative system - multisequential grammar and application topics are chosen according to possibilities supported by multisequential grammars. In order to follow results published by Thompson (see [9]), Lindenmayer (see [26]), Mandelbrot (see [8]) and also studies published by Morneau (see [17]), which shows the relation between natural laws and human discipline - mathematics, we study the applications of multi-sequential grammars from two points of view: generative L-systems (which further includes applications of fractal geometry and biomathematics) and natural language processing (which further includes the design of proper abstract language). Some problems related to compiler construction are also mentioned.
Compiler of State Diagram Language to CHILL Language
Goldmannová, Zuzana ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the grammar of an existing proprietary state diagram language, which is used to simulate state diagrams employed in telephone exchanges. The goal of this work is to analyze the grammar and existing compiler of this language to CHILL language and also to design and implement a new compiler. This new compiler will be easier to manage and will eliminate errors and imperfections of the current arrangement. Finally this compiler is tested using existing files, that were formerly created for the current compiler, and also using files I created for testing purposes.
Design and implementation of authentication method for accessing web service in PHP language
Pokorný, Jiří ; Kacálek, Jan (referee) ; Uchytil, Stanislav (advisor)
Bachelor's thesis describes the available principles of authentication for access to Web services. It compares necessary hardware, safety, financial costs, complexity of implementation and difficulty of maintenance and service. The second part deals with the design and implementation of a particular authentication method for access to Web applications in PHP using the MySQL relational database. There is selected the authentication method by SMS code with regards to mentioned characteristics of particular methods. It is also supplemented by the possibility of using a client certificate.
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Security elements of electronic banking
Blaha, Ondřej ; Albrecht, Jakub (advisor) ; Voříšek, Jiří (referee)
The aim of my bachelorel thesis is to give a comprehensive overview of the electronic banking area and its security, with main focus on safety features used for authentication. The theses describes the available forms of electronic banking and the principles and elements of authentication methods. The main contribution of this work is the analysis of the environment of electronic banking ČSOB Bank and evaluation of authentication methods that the bank offers its clients. The result is an assessment of the current security status and suggestions what should ČSOB bank focus on in this area.
Password management in the enterprise network
Turanský, Jan ; Pavlíček, Luboš (advisor) ; Klíma, Tomáš (referee)
The aim of this bachelor work is to describe and evaluate the importance and options of password management in the enterprise. Almost each enterprise owns important documents with valuable information, which are saved to it' s servers or hard drives. Safe password management protects these information against attackers, who try to gain them and misuse. In a practical part is described actual password management in a specific enterprise with evaluation and with recommendation to improvement if necessary.
Online Banking and Consumers
KAKAŠ, Martin
The main aim of this thesis was to evaluate the use of Internet banking accounts among consumers. Investigate the pros and cons. Based on the analysis and data collection through online polling to assess and propose possible measures to improve services in internet banking. After studying the solved problems from expert resources, I set the main goals of this work and define hypotheses práce.K secondary data, I concluded the studies referred to literary resources and professional studies. Primary data were obtained šetřením.Výzkumné own experimental investigation of the main research was conducted via online interviews via the Internet and personal inquiries at the branch bank CSOB. The main research I conducted follow-up questions, interviewees were asked only at the branch of CSOB Czech Budejovice. A summary of results, I worked in tables and graphs and to evaluate the current situation in the field. Based on the data I provided any general recommendations for banks and concrete recommendations for a branch of CSOB Lannova 3 / 11 in the Czech Budejovice. Important recommendations for the Czech branch of CSOB Budejovice was economically evaluated against implementation. I completed my work, and finally appreciation. In which I have summarized the data obtained and the problems of internet banking, which I showed attachments.
Comparsion of classic and modern authentication methods
Koudela, Radek ; Doucek, Petr (advisor) ; Cidlina, Jaroslav (referee)
Owing to the growing significance of data protection and informatics in general, the importance of information system security counts among the most actual topics at this time. The main goal of this work is to give a comprehensive overview of the issue of users' authentication, including current trends on this field. There are also described the principles and working methods of classic and modern authentication methods, and listed their pros and cons. The main benefit lies in the comparison of these methods as well as in the evaluation of their deployment. As a result of this are suggestions, which can managers take into account when deciding about the method of authentication, and a description of weak points that need an attention. One part of this work also includes a reliability and performance test of modern biometric device.
Biometrické technologie a možnosti jejich nasazení
Jurica, Martin ; Doucek, Petr (advisor) ; Bébr, Richard (referee)
Hlavním cílem této práce je, na základě sumarizace všech informací o současných biometrických systémech, které jsou relevantní pro jejich vzájemné porovnání, sestavit univerzální metodiku, kterou by bylo možno použít ke klasifikaci těchto technologií a zároveň k výběru nejvhodnější biometriky pro nasazení v libovolném prostředí. Vytvořená metodologie bude následně použita na dvou příkladech z reálného světa ? analýzu stávajícího systému pracujícího na základě ID karet v malé společnosti a následně na konceptu nasazení těchto technologií na VŠE Praha, jakožto náhrady současného systému čipových karet. Část práce také tvoří příklady výběru dle této metodiky pro modelové provozy.

National Repository of Grey Literature : 21 records found   beginprevious12 - 21  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.