National Repository of Grey Literature 156 records found  beginprevious131 - 140nextend  jump to record: Search took 0.00 seconds. 
The use of smart-cards in modern cryptography
Kočíř, Michal ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This thesis discusses the general use of smart cards in MULTOS in cryptographic applications. At first is described two types of authentication - the authentication by the subject with focusing on authenticators and the authentication by the knowledge. Furthermore there is the description of the anonymous authentication and attribute authentization. This is followed by a description of smart cards with a focus on MULTOS cards. There is also performed analysis of programmable smart cards .NET, JavaCard and MULTOS. Practical part is focused on the implementation of an authentication scheme, which is being developed at FEEC. The communication of authentication protocol is between the MULTOS card and reader connected to a PC. The protocol is composed of cryptographic functions such as random number generation, hash function, modular exponentiation, modular multiplication and difference of large numbers. It was also implemented the measurement of specific applications.
Internet privacy protection
Malina, Lukáš ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
Anonymous authentication is a mean of authorizing a user without leakage of user personal information. The technology of Anonymous Authentication Systems (AAS) provides privacy of the user and yet preserves the security of the system. This thesis presents the basic cryptographic primitives, which can provide anonymous authentication. Among these primitives there are usually some asymmetric cryptosystems, but an essential part of anonymous authentication is based on zero knowledge protocols, blind signature schemes, threshold group schemes, etc., that are presented in Chapter 1. Generally, Anonymous Authentication Systems have application as electronic coin, electronic cash, group signatures, anonymous access systems, electronic vote, etc., which are analyzed and presented in Chapters 2 and 3. In the practical section, the implementation (in the environment .NET in C#) of the AAS system is presented and described in Chapter 4, which is being developed at the FEEC BUT.
Rehabilitation Former Jaselsky Barracks Area in Brno
Křivinková, Tereza ; Vágner, Lukáš (referee) ; Rusín, Tomáš (advisor)
The urban design for an area of former barracks Jaselská kasárna in Brno is based on an effort to create sustainable town structure, which allows a free movement of inhabitants through the area. The lot is well connected to the city centre and has a good accessibility to public transportation. More over it is situated in a rather quiet part of Brno. Designed houses are oriented parallel to Štefánikova and Staňkova street. The design is defined by two types of public space – square and park. Nursing home for elderly is situated on their edge. The residents of the home have the opportunity to visit both public spaces. Shops and services are within the walking distance. Due to its location in the center of the new dwelling resort, the elderly stay a part of society and they will not feel useless.
Student Housing
Golík, Pavel ; Todorov, Petr (referee) ; Pelčák, Petr (advisor)
The architectural study built block the northern corner of town in close proximity to the center of Brno. The main thrust of the solution is particularly easy throughput area, pedestrian safety and ease of orientation in space. The architectural study of student housing is the first step change in the given locality by regulatory plan. The intention was to broken and fragmented forms of buildings to bring the urban elements, the wide streets, passages, squares and courtyards, which will evaluate and develop the character and vitality of the place. Architectural building block concept takes into account noise pollution site and responds to a bad indication, due to the north. New built-in design and layouts are designed so as to reduce the noise levels of interior space and create a resting zone in courtyard.
Intelligent Personal Assistants: Present state and potential risks
Smysl, Tomáš ; Sigmund, Tomáš (advisor) ; Kunca, Tomáš (referee)
This bachelor thesis aims to describe what is meant by term Intelligent Personal Assistant and what are the capabilities of this technology nowadays. The technology is being presented in the context of following topics: Internet and the Artificial Intelligence. These topics are commonly associated with few problems and risks. The problems connected with Internet and Artificial Intelligence might be inherited by the technology of Intelligent Personal Assistants (IPA) and because of other aspects of the technology, the risk of outcomes that may be potentialy harmful can be even higher with IPA than originaly. This thesis aims to define problems connected with privacy and addiction. It describes risks that arise from delegating mans work to a machine and potential danger of giving a machine personality traits. Eventually, the thesis suggests a possible solution.
Analysis of Privacy on Social Networks
Tomandl, Luboš ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to four recognized actors active on Facebook. Those actors are users, Facebook company, other corporations and government organizations. From all of these groups threats for user's privacy can come. This thesis not only tries to find these threats, but is wants to offer some solutions of this situation as well.
Security in hybrid cloud computing
Koudelka, Ondřej ; Karkošková, Soňa (advisor) ; Šperková, Lucie (referee)
This bachelor thesis deals with the area of hybrid cloud computing, specifically with its security. The major aim of the thesis is to analyze and compare the chosen hybrid cloud providers. For the minor aim this thesis compares the security challenges of hybrid cloud as opponent to other deployment models. In order to accomplish said aims, this thesis defines the terms cloud computing and hybrid cloud computing in its theoretical part. Furthermore the security challenges for cloud computing are defined and specified for hybrid cloud. The comparison of specific hybrid cloud providers is provided in the practical part along with the comparison of hybrid cloud security challenges.
Anonymization on the Internet with focus on the end user
Řapek, Lumír ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The Bachelor thesis deals with anonymization on the Internet with focus on the end user. The theoretical part describes information and tracks which user leaves behind while using the Internet. Attacks and threats which may endanger the user's anonymity are also discussed. The practical part is focused on easily available forms of anonymization. For this reason, the first part contains the description and multi-criteria comparison of anonymization extensions for web browsers which allow at least change of IP address. The second part contains the description and comparisons of two plug & play devices that also provide relatively easy way of anonymization.
The Analysis of Security and Anonymity in Cryptocurrency Payments
Maňák, Michal ; Šebesta, Michal (advisor) ; Bruckner, Tomáš (referee)
Bitcoin and other cryptocurrencies are getting into common usage more and more frequently. Unfortunately this spread is connected with attempts to misuse their principles for personal benefit. The goal of this thesis is to explain the main principles of using bitcoin in relation to the internet identity. This connection is represented by two sources in the thesis: the first is a bitcoin blockchain, the second is the sum of various user profiles used in discussion forums and similar websites. The aim is to create and explain the process how to, by using the combination of this two sources, reveal the identity of a human using cryptocurrencies for payment (from a private person point of view). First, methods used for extraction of correct and useful data from the blockchain and internet profiles must be developed to be able to mine data from the joint database, merging into a full user profile containing personal data. Results of this investigation are extended by the rules of preserving anonymity on the internet, containing both technological and behavioural measures avoiding a share of personal data. The end of this thesis explains possible attack vectors that might be used for compromising cryptocurrencies. The methods of searching of the internet identity are a useful tool for facing these attacks.
Analysis of the behavior of users of social network Facebook
Lehman, Tomáš ; Sigmund, Tomáš (advisor) ; Böhmová, Lucie (referee)
This thesis is about the issue of privacy in the virtual world of social networks. It describes the pitfalls as well as options in the area of privacy in a user interface of social network Facebook. It also analyzes the user knowledge of these options by using the questionnaire survey and try to find a correlations in the answers of users. The conclusion suggests ways to raise social awareness of the principles of functioning of social networks and the handling of personal data on the Internet.

National Repository of Grey Literature : 156 records found   beginprevious131 - 140nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.