National Repository of Grey Literature 9,401 records found  beginprevious9392 - 9401  jump to record: Search took 0.35 seconds. 

Legal protection of domains in relation to the right of indication
Greplová, Andrea ; Pítra, Vladimír (advisor) ; Růžička, Michal (referee)
63 10 Resumé Legal protection of domains in relation to the right of indication Domain names are a phenomenon of the last decade or two in which there has been an enormous increase in their popularity. We also have to point out the the misuse of domain names has also increased dramatically. The problems associated with domain names can be classified into several cathegories whereas the first one mainly concerns the content of a web presentation the second one is focused on the conflict arising from passing off and other intellectual property infringments. Due to technical requirements of domain names we can see that the number of available domain names is diminishing. This is a great opportunity for many individuals who are able to fully exploit the situation for their benefit. To counter-weight this trend there are initiatives aimed at enlarging the portfolio of available top level domains even though the effectivity of these initiatives can disputable. This piece of work is divided into two parts which overlap in some aspects. The first part is looking on a daomain name as a new legal concept not governed by an explicit statute thus wandering in between various schemes. This part attempts to define the domain name technically as well as legally focusing on its systematization and unveiling the basic...

Deniable encryption
Šebek, Marcel ; Tůma, Jiří (advisor) ; Krajíček, Jan (referee)
In the thesis we study deniable encryption, as proposed by Canetti et al. (CRYPTO 1997). Standard encryption schemes guarantee good security level unless the adversary is able to force the sender and/or receiver to reveal her secret knowledge. Assuming that the adversary knows true ciphertext, the se- cret inputs usually commits the sender/receiver to the true plaintext. On the contrary, deniable scheme is equipped with algorithms that provide alternative secrets which makes the adversary believe that different plaintext was encrypted. We recall the most important results in the area, in particular, the schemes of Canetti et al. (CRYPTO 1997), the scheme of Klonowski et al. (SOFSEM 2008) based on ElGamal encryption, schemes of O'Neill et al. (CRYPTO 2011), and schemes and impossibility result of Bendlin et al. (ASIACRYPT 2011). In ad- dition to presenting known results in an unified environment, we deeply investi- gate simulatable-encryption based schemes. In particular, we construct a scheme that is bideniable, and both of its induced schemes are receiver-deniable (in the flexible/multi-distributional setting). We also disprove part of the results of Bendlin et al. (ASIACRYPT 2011) by showing that their construction of fully bideniable scheme is wrong. This result is verified using computer simulation....

Design Better Content Development Process for SCAP Standards
Beňas, Petr ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Cílem této práce je nastudovat a zjednodušeně popsat standardy SCAP používané pro standardizované předávání informací o zranitelnostech a dalších dat souvisejících s informační bezpečností, se zaměřením na formáty XCCDF a OVAL. V textu jsou zkoumány existující přístupy a nástroje sloužící k tvorbě obsahu těchto standardů. Na základě získaných poznatků je navržen nový nástroj s cílem řešit nedostatky existujících přístupů. Text práce také popisuje implementaci a testování navrženého nástroje.

Specification Languages and Tools for Analysis and Verification of Security Protocols
Ptáček, Michal ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This diploma thesis is focused on the analysis of security tools, which are commonly used for automatic verification of security protocols mainly. These security protocols are used for creation of private communication channells in insecured networks. Security will never be perfect, so finding of weaknesses in security protocols is always necessary and we need to improve these protocols. In this diploma thesis I have focused on looking for various verification tools on Internet. Subsequently, I have described each tool in this thesis, in way that each reader can easily find out, which tool is for him useful and which is not. I have summarized main benefits and drawbacks of each tool at the end of his description.

Facebook
Jůnová, Jana ; Švelch, Jaroslav (advisor) ; Vochocová, Lenka (referee)
The theme of this thesis is to assess the behavior while using the public communication network Facebook. The number of users of social networks increases, as well as number of photographs, videos and other input that is stored on the Internet. Particularly, young people try to maintain or further develop their contacts by this way. Perhaps it is a new type of social convergence, which is more or less based on voyeurism, or just an expression of self- realization. In any case this behavior impacts shaping the social relationships of networking users and their free time in a real life. Through a research of Facebook users, this work is looking for uncovering the thinking process of people when publishing private matters via the Internet. Its main goal is to explore the usage of Facebook, depending on the knowledge of its surround. First of all, it is interested in users' network settings experience. Because the adjustment of Privacy Policy may prevent risk of misuse of the social networking, which may lead to disruption of the privacy of all users involved. The main question of the thesis is to what extent the users are aware of the interaction of the environment that is "watching" them. Basicly, when talking about this topic, the most important question is notifying the process of blurring the...

Quantum computers and their impact on public-key cryptography
Lushnikova, Marina ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The aim of this thesis is to study quantum computers and their impact on public-key cryptography. Crucial part of the work is dedicated to theoretical basis and definitions necessary for understanding the basic principles of quantum computers. The further chapters describe Shor's algorithm, explain the part of integer factoring problem in the security of current public key cryptographic algorithms, and show how to break the most widely used assymetric algorithm RSA by means of effective factoring. Last chapter provides comparison of classical factoring algorithms with Shors algorithm, mentions cryptography resistant to quantum computer attacks and discusses the current state of development in the field of qunatum computing. The conclusion summarizes both potential and real impact of quantum computers on public-key cryptography.

Public Fears, Feeling of Safety and satisfaction with the activities of the police - December 2015
Tuček, Milan
In December survey of the Public Opinion Research Centre, citizens answered questions concerning their fears, their sense of security and their satisfaction with the activities of the police.

Protection of personal rights of individual in mass media
Knytlová, Kateřina ; Švestka, Jiří (advisor) ; Salač, Josef (referee)
11. Abstract in English This Master Thesis refers to the protection of personal rights of the individual in mass media. The main purpose is to analyse Czech legal regulations regarding this matter and to assess if the level of judicial remedy for the protection of personal rights is sufficient and appropriate. This thesis is focused on the collision of two fundamental rights, namely the right to protection of personal rights and that of freedom of speech and expression. Because of the growing influence of mass media, these rights are frequently at the centre of public debate and issues. The principal problem is which right should be prioritized. Both of them are established as fundamental human rights at the constitutional level therefore enjoy the same degree of protection. Attention is also paid to Spanish legal regulations of protection of personal rights of the individual in mass media. The important differences between the Czech and Spanish legal systems are pointed out throughout the whole paper. The thesis is composed of seven chapters. The first chapter is introductory. Chapter two deals with the protection of personal rights in general and explains this concept while enumerating law sources. Chapter three describes the protection of personal rights of the individual in mass media. It elaborates on...

Changes in the structure of personality convicted after finishing thein therapeutic exposure in specialized department in Prison Mírov
Brauner, Arnošt ; Boukalová, Hedvika (referee) ; Urbanová, Miluše (referee)
This work is focused on the issues dealing with the affectivity of offenders' specialised treatment during their stay in the specialised department for offenders with mental disorder and behaviour disorder during the execution of punishment of imprisonment in the prison with enhanced security. The history of specialised treatment with focus on offenders with mental disorder is generally described in the introduction. Furthermore, there is a specification of diagnostic criteria and aetiology of various types of mental disorders and there is also described the development of humanizing efforts within the Prison Guard of the Czech Republic in accordance with the legislative changes after the year 1989. Moreover, there is also outlined the way of treatment, therapeutic processes and methods which were applied within the specialised department. The aim of this research is to evaluate the effectiveness of applied therapeutic methods in the treatment community system. The results of the examined file are evaluated on the bases of results of psychological examination performed during the enrolment to the specialised department and psychological examination after the completing of the treatment program and subsequent ending of the stay in the specialised department. After statistical evaluation of the...

Mexican government and its fight against drugs: Analisys of current situation
Kafková, Michaela ; Němec, Jan (advisor) ; Paulenková, Kristína (referee)
The approaches of the mexican presidents Felipe Calderón (2006 -- 2012) and Enrique Peňa Nieto (2012 -- present) to the so called "drug war" in Mexico are the main topic of this bachelor's thesis. The "drug war" fully broke out in Mexico in the year 2006 and it has been a considerable threat to the country's stability and security. Main object of the thesis is to find and judge differences between the two president's approaches to the fight against the drug trafficking organizations. It also tries to answer the question if president Nieto is returning to the old practeces of the political party he is a member of and which used to tolerate the drug cartels in the past or not. The thesis firstly explains the strong position of a president in presidential political systems, next it sums up the historical developement of mexican political system and its current shape and afterwards it describes the programs and the main decisions of both of the presidents. In conclusion, programs and actions concerning the fight against drug trafficking organizations of president Calderón and president Nieto are compared and the main differences among them are expressed.