National Repository of Grey Literature 48 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Design of Access System as a Part of Physical Security Solution
Dohnal, Matěj ; Svoboda, Vlastimil (referee) ; Sedlák, Petr (advisor)
This master’s thesis deals with design of an access system as a part of physical security solution for an energy company in the Czech Republic. The access system is designed to meet all legal requirements and conform to ISO 27001 certification. Implementation of the proposed access system is demonstrated on the selected company object, a representative example of connecting the critical infrastructure element and the company's common facility.
Experimental infrastructure for electronic geocaching
Škrhák, Pavel ; Komosný, Dan (referee) ; Burda, Karel (advisor)
The aim of this work is to study conventional and electronic geocaching, and to implement the proposed infrastructure for electronic geocaching. The work describes convetional geocaching, it's history and present, as well as what is cache and what cache contains. next, the infrastructure for electronic geocaching, it's parts and communication between them is described. The work then describes the design of individual parts of the new infrastructure, and suitable technologies are selected for their implementation. The Django framework and PostgreSQL database were chosen for server appliaction.And a design for individual models for the server applicaation was made. The Angular framework was chosen for the client application. Design of individual pages and their functions was made for the client application. After the design, testing of already made applications was carried out, and it was decided, if the appliaction will be taken over or not. In the next part fo the work, the implementation of individual appliactions is made. The creation of page components and their functions, as well as communication with the server appliaction, is described for the client application. The server application implementation includes the creation of the designed models and database, as well as model serializers and API (Application Programming Interface) endpoints, that will allow the the client and mobile application to communicate with the server application. Individual activities and fragments were created for the mobile application, and communication with the server application and smart card was implemented.The smart card application has been taken over and slightly modified. The thesis further describes the testing of individual application and the results of this testing.
Cloud Service Access Control using Smart Cards
Muzikant, Petr ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Využití osobních čipových karet pro autentizaci do webových služeb – jako je cloudové úložiště – není triviální kvůli nedostatku open-source implementací, standardizací a dokumentace. Tato práce zkoumá možnosti takové operace a nabízí řešení založené na estonské sadě nástrojů Web-eID. Hlavním účelem tohoto projektu je umožnit komunikaci státem vydávaných elektronických průkazů totožnosti s webovými službami, ale díky své rozšiřitelnosti a open-source licenci je vhodný i pro obecné webové aplikace a vlastní, personalizované čipové karty. Výstupem této diplomové práce je rozšíření projektu v podobě velmi žádané nové knihovny pro validaci autentizačních tokenů pro jazyk PHP, dále instalovatelná Nextcloud aplikace umožňující dvoufaktorovou autentizaci s Web-eID, a také nový JavaCard applet, plně kompatibilní s Web-eID. V práci jsou rovněž prezentovány výsledky implementace s vyvinutým open-source JavaCard appletem a vyhodnocení potenciálu využití českých elektronických občanských průkazů se systémem Web-eID pro snadnější a rychlejší nasazení v budoucnu. Dodatečným cílem práce je také výpomoc vývojářům implementovat tuto silnou autentizační metodu do jejich webových aplikačních služeb, aniž by museli být odkázáni na státní, proprietární či nemoderní řešení.
Cryptography and security on the MultOS platform
Lidmila, Aleš ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the development of a security IoT system for user authentication using the MultOS platform. It also deals with the development and descriptionof a publishing system that manages MultOS endpoints.
Access control system using multilevel authentication
Cvrček, Tadeáš ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
The master's thesis focuses on authenticated key agreement protocols and their implementation on MultOS smart cards platform and devices running Google Android operating system. Implemented applications use NFC (Near Field Communication) interface for communication with cellphone, Bluetooth technology for communication with smart watch and smart card as SAM (Secure Access Module) module in a verifier role. The source code is universal, so it is possible to use it in other projects.
Web visualization and demonstrator of anonymous credentials
Chwastková, Šárka ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with the topic of attribute based credentials with revocable anonymous credentials. The main focus of this work is the implementation of this scheme through a web application. The web application serves primarily as a visualization, which shows the functionality of this scheme through animations, and also as a practical demonstrator. Data and cryptographic calculations for individual system protocols are provided by the given cryptographic C application that communicates with the created application. The web application is also able to communicate with the connected smart card reader and the MultOS smart card and thus create the transmission of APDU commands and responses between the smart card and provided C application.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Entrance and security systems
Kohut, Michal ; Bradáč, Zdeněk (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. At the end there was proposed a status automat machine of a smaller preventive exchange, which was adjusted in the program IAR visualSTATE.
Optimization of security algorithms for smart cards
Bartoňová, Veronika ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
In this diploma thesis I dealt with proposal of optimization security algorithms calculations, that will be implemented on smartcards. This project is based on knowledge of modular arithmetic, that is used in many encryption like public keys, digital signatures and has function. The result of this project is a design of changes for accelerate the security algorithms calculations.

National Repository of Grey Literature : 48 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.