National Repository of Grey Literature 177 records found  beginprevious164 - 173next  jump to record: Search took 0.01 seconds. 
DVB-MHP Interactive Application
Kasal, Petr ; Burget, Radim (referee) ; Číka, Petr (advisor)
This Master Thesis is engaged in Interactive TV standard. In the first chapter a general digital TV question and it's benefits are adumbrated. Next chapter deals with Interactivity for digital TV itself. More on possibilities of data security and protection during the transmission throught the reversal channel are discussed. The main part of the Thesis deals with developing an application enabling to obtain a statistical data from televiewers throught a set-top box connected to the Internet. The application is conceived as an universal enquiry, that obtains it's data via a reversal channel and is able to present the gained data in an attractive way. Java and PHP programming languages were applied to create the application and MySQL database with easy edit system is used to store the needed data. Specially designed security libraries based on XTEA cipher are used to enable protected communication.
Security risks of wireless access networks
Špidla, Milan ; Hošek, Jiří (referee) ; Polívka, Michal (advisor)
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
Security prospects of wireless communication networks
Hráček, Jiří ; Lambertová, Petra (referee) ; Škorpil, Vladislav (advisor)
This master thesis deals with all types of wireless networks security – in personal, local, metropolitan and also mobile networks. This work is mostly focused on wireless local area networks (WLANs), which are the most widespread at nowadays. This work describes attacks to the wireless local area network, attackers steps and possible protection against it. Some of these attacks are tested in practical part of this work. In this master thesis there were also designed and created two laboratory exercises. One of them is a simulation in the wireless network using Opnet Modeler application. The other exercise is strictly practical type.
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Security in hybrid cloud computing
Koudelka, Ondřej ; Karkošková, Soňa (advisor) ; Šperková, Lucie (referee)
This bachelor thesis deals with the area of hybrid cloud computing, specifically with its security. The major aim of the thesis is to analyze and compare the chosen hybrid cloud providers. For the minor aim this thesis compares the security challenges of hybrid cloud as opponent to other deployment models. In order to accomplish said aims, this thesis defines the terms cloud computing and hybrid cloud computing in its theoretical part. Furthermore the security challenges for cloud computing are defined and specified for hybrid cloud. The comparison of specific hybrid cloud providers is provided in the practical part along with the comparison of hybrid cloud security challenges.
RSA Algorithm and Its Use in Electronic Communication with State Authorities
FROULA, Stanislav
This bachelor thesis focuses on the RSA algorithm and it's use in electronic communication. The RSA algorithm is curently one of the most widely used asymmetric encryption algorithms. It was first publicly described in 1977 by the mathematicians Ron Rivest, Adi Shamir, and Leonard Adleman. It's the first algorithm that is suitable for both electronic signature and public key encryption. The theoretical part explains all related concepts of cryptography. The basic operating principle of the algorithm is described in specific simplified example. It also includes a description of public key encryption and a list of institutions, which use digital signature to verify authenticity of the sender. The practical part focuses on a questionnaire survey, which investigates the awareness level of internet banking users in term of security of using internet banking and following the security policy recommended by banks. The results are analysed and evaluated at the end of the thesis.
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
iOS platform security
Nidl, Michal ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter describes the system interferences and methods for their detection. The sixth chapter deals with comparison of iOS security and Android and Windows Phone platform security. In this chapter is introduced the security of competitive platforms in terms of security model, system security, application security and interferences. This comparison includes the table with evaluation of security. Objective of this thesis is to introduce ways of security in one of the most widely used mobile platform. Moreover the aim is to compare iOS security with security of two competitive platforms. The result is an analysis of iOS security and it's comparison with Android and Windows Phone security.
Analysis and implementation of application for digital currency Bitcoin
DRDÁK, František
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
Wardriving
Belák, Peter ; Pavlíček, Luboš (advisor) ; Beneš, Jiří (referee)
The Bachelor Thesis introduces the term Wardriving. It describes in detail the necessary hardware, including the parameters that it needs to meet for this work. Further, it describes in detail the software, its setting and necessary features. The work presents the elementary particulars which have to be complied with for the best results of the survey. Part of this work is a survey of selected areas of settlement Řepy 1, analysis of the data and their comparison.

National Repository of Grey Literature : 177 records found   beginprevious164 - 173next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.