National Repository of Grey Literature 135 records found  beginprevious55 - 64nextend  jump to record: Search took 0.00 seconds. 
Trusted long-term digital archive
Mravec, Roman ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor's thesis is focused on problematics of long-term trusted preservation. Security and trustworthiness of electronic documents is one of the main aim of this research. Provides means needed to keep and maintain data integrity, non-repudiation, long-term readibility and legally-binding of electronic documents. Solves time resistant formats for archive data files. Contains design of trusted long-term archive based on valid laws and standards in field of electronic preservation.
Data transmition security with general linear block codes
Dzurenda, Petr ; Tejkal, Vladimír (referee) ; Němec, Karel (advisor)
This work deals with problematic basic characteristic common linear block codes, concretely with creation generating and controlling matrix and individual ways decoding common linear block codes and then are theoretic knowledge used in the next part bachelor’s thesis. Next part this work is bent on the concrete layout of common liner block code satisfactory specifications by submission. In this part it can by find way haw create generating matrix be able to correcting tree single errors then create control matrix for decoding and correct network for correcting errors. Programs are used in this work are explained there. In the end this part is example of coding and decoding. Lastly work is realization codec. In this part is description of coder and decoder realizations. This codec is simulating by program Matlab Simulink in part five. In last part are create boards of printed circuits by program Eagle for coder and decoder.
Web Application of Authentication System
Nohava, Martin ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The subject of the bachelor thesis is the design and development of graphical-user interfaces for cryptographic protocols using web technologies. Specifically, it adds the possibility to control the PEAS authentication system through web interfaces. The thesis first evaluates the contemporary possibilities of modern web applications and pays attention to the issue of interconnecting web technologies with authentication system created in C programming language. For this purpose, the work also focuses on the Webassembly technology. In the practical part, four graphical user interfaces were created, one for each entity of the authentication system. They are built on web technologies such as HTML, CSS and JavaScript, utilizing the Vue.js framework. Communication with the authentication system provides the developed web servers. They are using API and run in the Node.js environment.
Attribute-based access control system
Strava, Bronislav ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This bachelor thesis is focused on implementing web application of verifier entity for attribute based access control system.
Cryptographic support of current programmable smart cards
Vančo, Petr ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This bachelor thesis focuses on benchmark tests of the MultOS smart cards. The characteristics of the smart cards are described at the beginning of the thesis, next part is about smart card communication. Then there is a comparison of operating systems. Next chapter is about cryptographic support for smart cards. Here is also described, which tools are used to develop for operating system Multos. The system for management and testing smart cards with MultOS was implemented in this thesis. Whole development process is described in last chapter, for smart card application, and for PC application with user interface.
Web application on pairing-based cryptography
Mogrovics, Alexander ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Cílem této práce je osvětlit kryptografii eliptických křivek za pomoci webové aplikace. Sleduje matematické a algebraické principy vytvoření eliptických křivek v množině konečných těles a následné počítání s nimi, včetně bilineárního párování. Práce také popisuje architekturu a impementaci webové aplikace, která je tvořena šablonou s vloženými SageMathCell prvky, aby byly minimalizovány nároky na úložiště. Tato aplikace umožňuje uživatelům provádět výpočet bodů eliptické křivky v množině konečných těles a vykreslení jejich grafu, vykreslení grafu v množině reálných čísel, provádění operací nad body eliptických křivek, vytvoření bilineárního páru, ustanovení výměny klíčů mezi třemi stranami pomocí Diffie--Hellman protokolu a realizaci MOV útoku.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá implementací a vytvořením kryptografické knihovny a grafického uživatelského rozhraní (GUI) pro nově navržený protokol "Smlouva o autentizačním klíči na základě Shamirova sdílení tajemnství" (ang. "Shamir’s Secret Sharing-based Authenticated Key Agreement", zkráceně ShSSAKA). Protokol je založený na principu AKA (autentizovaná domluva klíče), Schnorrově podpisu a rozšířen Paillierovým schématem pro možnost podílení se více zařízení na podpisu a autentizaci. Prezentovány jsou také benchmarky na osobním počítači a RaspberryPi.
Deployment of Threshold Signatures for Securing Bitcoin Transactions
Tran, Minh ; Dzurenda, Petr
Blockchain technology, especially Bitcoin, has revolutionizedhow we think about and manage financial transactions.However, with the increasing demand and usage of blockchaintechnology, the security of cryptocurrency wallets has become acritical concern. Threshold signatures offer a promising solutionto this problem, allowing multiple parties to sign a transactionwithout revealing their private keys. This article presents an Androidmobile Bitcoin wallet application that uses Schnorr-basedthreshold signatures. The application also deploys smartwatchintegration for enhanced security and usability. This integrationprovides an additional layer of security by requiring physicalconfirmation from the user before approving any transaction.Our implementation provides a secure and efficient platform formanaging Bitcoin assets using threshold signatures while alsoproviding an intuitive and easy-to-use interface for interactingwith the application.
Analysis and Detection of PWS Malware
Blažek, Jan ; Křoustek, Jakub ; Dzurenda, Petr
Cyberdefense became important, especially duringthe last decade. The rapid growth of information technologiescaused a significant increase in cyber attacks and threats onthe Internet. Malware analysis forms a critical component ofcyberdefense mechanisms. In this article, we study the issue ofmalicious code and its various types, with a specific focus on thetype known as PassWord Stealers (PWS). To do so, we deployedseveral methods of analyzing binary executable code, such asstatic and dynamic analysis, and sandboxing. We analyze 11recently discovered malware families. From that, we discovered3 new strains of malware, namely SevenStealer, NeedleDropper,and AtlantidaStealer. Furthermore, we have created appropriatedetection rules for all of these malware, which have improvedthe detection capabilities of Avast anti-virus (AV) softwareworldwide. At the end of this article, we present the resultingdata illustrating the spread of analyzed malware in the user baseof the Avast company.
Data Mining Based Web Analyzer of Job Advertisements
Wittner, Alex ; Dzurenda, Petr (referee) ; Sikora, Marek (advisor)
Cílem této bakalářské práce bylo vytvoření automatizovaného zadávání nových pracovních inzerátů pomocí vložení URL v rámci již existující webové aplikace https://rewire.informacni-bezpecnost.cz, jejíž cílem je shromažďování pracovních inzerátů v oblasti cybersecurity s podrobnou analýzou pracovních kompetencí. Pracovní inzeráty jsou analyzovány pomocí více vzorového vyhledávacího algoritmu Aho-Corasick, psaného v jazyce Java. K získávání informací ze zadaných pracovních inzerátů slouží Python skript využívající knihovnu Selenium. Výsledná implementace a webová stránka je vytvořena pomocí jazyka PHP a knihovny ReactJS využívající JavaScript.

National Repository of Grey Literature : 135 records found   beginprevious55 - 64nextend  jump to record:
See also: similar author names
1 Dzurenda, P.
Interested in being notified about new results for this query?
Subscribe to the RSS feed.