National Repository of Grey Literature 47 records found  beginprevious38 - 47  jump to record: Search took 0.00 seconds. 
Secure and privacy-preserving data communication
Bernát, Michal ; Člupek, Vlastimil (referee) ; Malina, Lukáš (advisor)
This thesis discusses the possibility of ensuring the safety, integrity and authenticity of data communication with respect to user privacy. This thesis describes the fundamentals of smart grid networks with capabilities of existing forms of security to communications that have been chosen as a target for application deployment of group signatures to ensure the security, integrity and authenticity of data communications. It describes the concept of a zero-knowledge and cryptography primitives. Further, the basic principles are presented, the history of development, and various schemes are compared based on the construction and performance. The second part is given to the deployment and optimization of group signatures for computationally limited devices. Within the draft report were to be implemented in the Java language chosen scheme HLCCN, DP and BBS. They were then tested under various platforms which were measured and evaluated performance parameters of the schemes. The optimization of the work is focused on the times of signatures, which are critical to a smart grid system. Under the platforms are deployed pre-processed pairing optimization methods and other methods resulting from the deployment platform as JPBWrappera and native libraries to deliver more efficient times of sgnaiture. At the end of the thesis are evaluated achievements of optimization methods and the appropriateness of the deployment of smart grids.
System of anonymous data collection
Troják, David ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with contemporary approaches that provide higher protection of privacy of users. It focuses mainly on a group signature. In the practical part of this thesis I designed and implemented PS that is enable to gather information with the help of signal of a mobile device. The application was designed in accordance with fundamental cryptographic requirements such as the authenticity and the integrity of transmitted data. The anonymity of users is guaranteed through an application layer (the group signature) as well as through a network layer (Tor).
Anonymous communication in Internet environment
Pajtinová, Mária ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Master´s thesis focuses on certain possibilities of how user can anonymously commununicate through the Internet. There are described following anonymous programs: TOR, JAP, I2P and CyberGhost, which allow user to hide his own identity to other IP address. Subsequently, measurements from different technologies are made by anonymous program TOR for calculate transmission speed.
Anonymization on the Internet with focus on the end user
Řapek, Lumír ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The Bachelor thesis deals with anonymization on the Internet with focus on the end user. The theoretical part describes information and tracks which user leaves behind while using the Internet. Attacks and threats which may endanger the user's anonymity are also discussed. The practical part is focused on easily available forms of anonymization. For this reason, the first part contains the description and multi-criteria comparison of anonymization extensions for web browsers which allow at least change of IP address. The second part contains the description and comparisons of two plug & play devices that also provide relatively easy way of anonymization.
Sharing informations in anonymous networks
Jonák, Martin ; Zumr, Jiří (advisor) ; Klíma, Tomáš (referee)
This work aims to introduce possibilities of sharing informations in envinroment of anonymous and P2P networks. The first part describes the principles of selected tools that allow access to an environment of anonymous networks. At second part is reader acquainted with processes of publishing informations in the form of webpage in that environment. The end compares advantages and disadvantages of each solutions.
Changes in international tax planning resulting from increased intergovernmental cooperation and implementation of the global information exchange
Jedličková, Zuzana ; Francírek, František (advisor) ; Jakoubek, Jiří (referee)
The thesis is focused mainly on changes in the field of tax planning, global exchange of information and documents, on the basis of which the information exchange is realized. The thesis is also devoted to protection of identity of owners of assets and income, and various instruments which allows preserving it. The practical part of the thesis is formed by a case study. The aim of the thesis is to coherently examine and summarize the changes that took place in international tax planning over the past few years, mainly because of increased international cooperation in tax matters.
Aplikace pro vyhledávání a ukládání proxy serverů
Záklasník, Martin
This Bachelor thesis describes the types of anonymous access to web pages and solves how to effectively defend against them. The work is divided into four main parts. The first part describes the company which the application is created for. The second part deals with the theory of how the anonymity on the Internet works, what is it and what the proxy types exists. The third section solves the methodology for the proxy detection. The fourth part deals where you can get proxy servers and the fifth part solves the application itself to catch proxy servers.
Modern addictions
ŘEZNÍČKOVÁ, Eva
The Bachelor thesis The modern addiction is focused on internet issues and risks, which are connected with internet connection not only for the young. The thesis is in the theoretical part focused on the definition of fundamental terms, i.e. the young, lifestyle of the young and their specific communication, further more media and their effect on the young. Last but not least, the characteristic of internet as a source and risks of this modern addiction are showed here. The practical part is focused on the mapping of internet position and effect on the life of today´s youth. The aim of this thesis it to analyze the internet effect in its form and content on the current youth. I describe in the thesis how internet influences today´s youth and what pitfalls may arise from that.
Virtual communication and how it can be used in low-threshold facilities for children and youth
EGERMAIEROVÁ, Václava
The thesis is focused on the specifics of the social service called low-threshold facility for children and youth and how the virtual communication can be used to work with the clients of the service. In the theoretical part the low-threshold facilities for children and youth, range, principles and target audience of this social service are described. Also function and purpose of communication is described and the specifics of mobile and virtual communication are characterised. The possibilities how to use the mobile and virtual communication in basic and special social consultancy are another topic. The practical part is focused on mapping how the area of Czech Republic is covered with the facilities supplying the social service called low-threshold facility for children and youth. It also includes a survey research reflecting actual practise in using the virtual communication as a tool when working with clients in these facilities. In current facilities mainly e-mail and Facebook social network are used sometimes also Skype, ICQ application and other social networks. Current practise is very diverse because a complex professional methodical basis to supply this service model is still missing.
Possible ways to gain information about internet users.
Ross, Richard ; Měsíček, Libor (advisor) ; Molnár, Zdeněk (referee)
This thesis is aimed on internet security, gaining the anonymity and creating a guide to increase self defense of internet users. The goal of this paper is to describe the types of cyber attacks that can be done on internet users and to describe circular flow of information about users on internet and its use by third parties. Additional goal is to design the ways of reaching the anonymity on internet and to provide a guide to increase a self defense of the users. This thesis gradually describes creation of internet, world-wide-web and web standards, which is important for understanding the vulnerability of today's internet. Thesis is complemented by enumeration of relevant protocols of ISO/OSI model, which has share on user's everyday communication. Next part pass to attacks itself both technical based (e.g. Man-In-The-Middle) and social based (e.g. Phishing). This paper also aims on collecting the data of internet users by third parties and on the ways how to prevent it and reach the anonymity on the internet. End of this paper belongs to the list of security steps for standard internet users, by which they will be able to minimize the risk to minimum. Final chapter presents online blog that was created to enhance awareness of internet users.

National Repository of Grey Literature : 47 records found   beginprevious38 - 47  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.