National Repository of Grey Literature 106 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Linear Cryptoanalysis
Kopko, Jan ; Hanáček, Petr (referee) ; Cvrček, Daniel (advisor)
This paper discusses one of possible attacks on block ciphers - linear cryptanalysis. In the beginning of this paper a basic structure of block cipher is presented, as well as concrete cipher on which the linear cryptanalysis is presented. After that basic principles of linear cryptanalysis and a preview of attack on this cipher follow.
TMC Displaying on WEB
Kučírek, Tomáš ; Samek, Jan (referee) ; Hanáček, Petr (advisor)
The main goal of my bachelor´s work have been creation and evolution of the programm, which would be capable to process radio broadcasting of the RDS channel an TMC event. Another step was creation of the website, which would be able to feature these information, either textually and topografically. Theoretically I was concerned to RDS-TMC standard and detailed elaoboration of the TMC event. This aplication was finally succesfully tested and gained results compared to another interner sources.
Watermarking as Document Protection
Segedy, Patrik ; Kočí, Radek (referee) ; Hanáček, Petr (advisor)
This thesis is dealing with document protection using a digital watermarking. First, a watermark characteristics are presented. Then, different usages of the watermarking are discussed. Next part of the thesis is dedicated to current development in watermarking field. It is aimed at various principles of watermark embedding into different multimedia types. Subsequently, a watermarking scheme for still images is proposed and implemented. Finally, the watermarking scheme undergoes attacks, which should damage embedded watermark. Attacked watermark is then extracted and compared to the embedded watermark.
FITkit CAN Implementation
Jančo, Tomáš ; Janoušek, Vladimír (referee) ; Hanáček, Petr (advisor)
This thesis describes main principles of communication on CAN bus, design and implementation of CAN bus controller. The controller is implemented in VHDL for school development platform FITkit. This work also describes design of CAN physical layer circuits for connecting FITKit to CAN bus.
Remote Control for Home Automation
Polgár, Václav ; Kočí, Radek (referee) ; Hanáček, Petr (advisor)
This bachelor's thesis deals with design and implementation of system for remote control of home appliances. The resulting control system involves the simple application that uses Bluetooth wireless technology to communicate with hardware components which can operate the appliances working on the infra principle.
Modular Architecture of Distributed Applications
Musil, Jiří ; Hrubý, Martin (referee) ; Hanáček, Petr (advisor)
Traditional architectures of software systems are in heterogenous environment of today's computer networks too heavy-footed. One of principles, which tries to solve this problem is service-oriented architecture (SOA). Practical way of its implementation is represented by web services (WS) built upon protocols like SOAP or XML-RPC. This diploma thesis focuses problem of providing contextual information to mobile devices and its solution based on SOA principles. The thesis introduces design and implementation of web service providing contextual information to mobile devices and prototype of modular inverse SOAP proxy server allowing its effective monitoring and management.
Web Service for Electronic Vouchers
Jurdová, Natália ; Hanáček, Petr (referee) ; Kočí, Radek (advisor)
This bachelor thesis describes a creation of a web service for managing discount vouchers in the company AIS Servis Ltd. The web service is implemented in the programming language Java and provides methods for creating, editing, deleting, searching and applying discount vouchers. It also allows import and export to the CSV (Comma- separated values) file format and the creation of statistics on the application of discount vouchers.
The Design of Minimal Bluetooth Stack
Gazda, Martin ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This master's thesis main aim is to design minimal Bluetooth stack for embedded applications running on an education platform FITkit. This paper contains a theoretical foundation for that work and implementation description. The main section includes Bluetooth protocol stack design and main opportunities which such a design raises.
Trust and Reputation in Distributed Systems
Samek, Jan ; Návrat,, Pavol (referee) ; Šafařík,, Jiří (referee) ; Hanáček, Petr (advisor)
This Ph.D. thesis deals with trust modelling for distributed systems especially to multi-context trust modelling for multi-agent distributed systems. There exists many trust and reputation models but most of them do not dealt with the multi-context property of trust or reputation. Therefore, the main focus of this thesis is on analysis of multi-context trust based models and provides main assumptions for new fully multi-contextual trust model on the bases of them. The main part of this thesis is in providing new formal multi-context trust model which are able to build, update and maintain trust value for different aspects (contexts) of the single entity in the multi-agent system. In our proposal, trust value can be built on the bases of direct interactions or on the bases on recommendations and reputation. Moreover we assume that some context of one agent is not fully independent and on the bases of trust about one of them we are able to infer trust to another's. Main contribution of this new model is increasing the efficiency in agent decision making in terms of optimal partner selection for interactions. Proposed model was verified by implementing prototype of multi-agent system when trust was used for agents' decision making and acting.
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.

National Repository of Grey Literature : 106 records found   1 - 10nextend  jump to record:
See also: similar author names
4 Hanáček, Patrik
4 Hanáček, Pavel
Interested in being notified about new results for this query?
Subscribe to the RSS feed.