National Repository of Grey Literature 139 records found  beginprevious115 - 124nextend  jump to record: Search took 0.00 seconds. 
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Mobile application using Google beacon technology
Krajanec, Štefan ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This Bachelor thesis focuses on utilizing beacon technology in Android applications. Beacon technology allows for determining an approximate distance of the user from the beacon.. In order to verify the reference numbers given by the manufacturer we conducted an observation to measure the power of the received signal in reference to distance. 3 brands of beacons were tested, Kontakt.io, PROXioT and IBKS. The observasion has been iterated in an open field setting. Findings from this observation was implemented into an application designed for shopping mall marketing. The application, after getting closer to the beacon distinguishes between different behaviour types; behaviour as an instant notification, as a position log into a database, as a time stamp log (time spent near the beacon) into a database and as a conditional response. The aim was to resolve the problematics of communication with the beacon as universally as possible so the impletation into other projects would be as simple as possible. The aforementioned app is the output of this thesis.
Attribute based authentication
Chwastková, Šárka ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis deals with attribute based credentials. It describes attribute systems, their entities and properties generally. The work concentrates specifically on the attribute system Identity Mixer. The process of communication of the attribute system Identity Mixer is implemented in the language of JavaScript. Application is the web visualization, which describes protocols, entities and generally computes protocols of Identity Mixer with inputs of small numbers or predefined large numbers.
Security and Privacy on Android Devices
Michalec, Pavol ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is about Android security. The main goal is to get acquainted with the security and cryptographic features of Android OS and then implement the knowledge gained into file encryption application. The theoretical part will familiarize readers with the new security mechanisms in Android 6, 7 and 8. We will also be dealing with malware and other forms of Android OS attacks. In the practical part, we will evaluate the cryptographic capabilities of Android as well as compare several libraries and applications for cryptography. Finally, we create our own cryptographic application with support for symmetric, asymetric and post-quantum cryptography.
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Zero knowledge authentication
Bošeľa, Jaroslav ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis looks to authentication, principle and basic divison. Another part of thesis looks to Zero–Knowledge protocols, which protocols with zero information, their analysis and base elements, also thesis presents technology Bluetooth Low Energy, specification of this technology in transmission simple data between computer Raspberry Pi 2 and mobile phone. The practical part of thesis works on experiment of sending simple data between Raspberry 2 and Android phone.
Secure User Authentication Using Smart Cards
Koutný, Tomáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis deals with Basic Card problém and their analysis in terms of the offered features cryptographic security measures. Elliptic curve method was used in this thesis. The thesis contains design of authentication protocol and its implementation.
Authentication in the IoT
Drápela, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
Bachelor thesis focuses on authentication in the IoT. Some of the authentication protocols from the area of IoT are introduced at the beginning of the thesis. Next part of the thesis describes the NFC and BLE technologies, which can be applied in the IoT. Multi-device protocol is implemented using different devices (PC, mobile phone, SmartWatch). This protocol enables autentication based on the processes above the elliptic curves. Two sets of measurements (simulated and practical) are provided. In the final part of the thesis all the results are assessed.

National Repository of Grey Literature : 139 records found   beginprevious115 - 124nextend  jump to record:
See also: similar author names
1 Dzurenda, P.
Interested in being notified about new results for this query?
Subscribe to the RSS feed.