National Repository of Grey Literature 23 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Biometric data authentication using remote database
Menčík, Vlastimil ; Jirovský, Václav (advisor) ; Hoksza, David (referee)
A range of issues arises in biometric authentication primarily concerning protection of biometric data against security leaks and potential abuse. Biometric data is inherently irreplaceable and its protection must be a key part of an authentication system. This thesis proposes a solution, in which a remote server authenticates users without transferring their biometric data across network. The key is the introduction of representative sets of biometric samples. User's sample is matched with elements of representative set by a score function. Resulting score vector is stored in a database. Users are authenticated by scoring their biometric sample against the representative set and the resulting vector is matched with the enrolled score vector.
Dimensional analysis for HD languages
Horváth, Martin ; Bednárek, David (advisor) ; Jirovský, Václav (referee)
The engineers today use special description languages for developing electronic circuits and these enable them to test their models prior to their industrial construction. However, none of these languages provides sufficiently complex means to define physical dimensions and units for quantities used in the models and to check their consistency in all equations and computations. The inconsistency in the usage of physical units can be caused by plain typing errors but sometimes represents deep conceptual flaws. The tracking of these errors can be very difficult as the models commonly consist of thousands of lines of code. This master's thesis sets itself two goals. The first is to analyze the problem of physical dimensions, formalize their properties and devise an algorithm for automatic checking of their usage in the models written in hardware description languages. The second is to design and implement the system for annotating models with dimensional information and to implement the algorithm of dimensional analysis as a module into commercial tool ModLyng which is the integrated environment for developing analog/mixed-signal integrated circuits. The usage of this automatic analysis will help engineers in writing correct models and will speed up their development.
Wireless Networks Security
Turek, Lukáš ; Forst, Libor (advisor) ; Jirovský, Václav (referee)
This thesis compares the security of several wireless technologies and studies the security of networks based on IEEE 802.11 standard more in detail. Methods of securing are assessed in the view of resistance against eavesdropping, unauthorized access, DoS attacks and also attacks from inside of the network. Examples of configuration and in some cases also ways of attack are demonstrated. The thesis also studies related problems of secure passwords selection of and stored login data protection. At the end it suggests a way of securing a home network, a company network and a network of Internet service provider.
Authentization in distributed web caching environment
Miňo, Tomáš ; Jirovský, Václav (advisor) ; Bulej, Lubomír (referee)
Web servers migth contain sensitive informations, which require authentication. To decrease load of these server, distributed cache system can be used. This thesis consider some proposal of authentication within distributed cache system, which has to follow the security politics of the original server, but without replication the database of access control rules from the original server. Next, the security analysis and prototype implementation of the proposal is accomplished and described.
The system for monitoring and analysis of modifications of selected server pages
Kaska, Michal ; Jirovský, Václav (advisor) ; Galamboš, Leo (referee)
Design and realization of system for harvesting, watching and analysis changes to pages of chosen web servers in particular domain based on parameters setting. The system is able to recognize changes without dependency on language evaluate relevancy of the changes and compare them. The system is optimized with parallel processing of provided operations.
Multimedia Grid
Šimko, Viliam ; Galamboš, Leo (advisor) ; Jirovský, Václav (referee)
The thesis describes the possibilities and issues of existing videoconferencing systems. We focus on open-source solutions for group-to-group communication especially the AccessGrid technology that utilizes the multicast packet delivery method of multimedia content. We describe AccessGrid node created for CIANT organization, which has been taken as a starting point for de ning the architecture of a videoconferencing system based exclusively on open-source components, particularly Linux and related software. We address issues related to rewalls and NAT traversal and provide a comparison of various videoconference-related codecs and protocols. Finally, the text touches the question of recording and archiving of conference sessions and provides a new integrated recording application { StreamVNC. The tool allows users to prepare their presentations using localhost recording facility which includes AGVCR for recoding RTP packets, EVIC for grabbing the VNC display and camera source and RAT as an audio encoder.
The VoIP protocols real time analyzer
Dvořák, Michal ; Jirovský, Václav (advisor) ; Kvítek, Petr (referee)
This thesis goal is to desing an application which would allow real-time monitoring and analyzing of services for transferring voice over the Internet network, based on the study of the relevant standards. The thesis focuses on monitoring the H.323 standard. An implementation is a part of this thesis.
From software team to software firm
Prokeš, Radovan ; Král, Jaroslav (advisor) ; Jirovský, Václav (referee)
This Graduation Thesis is about a software company start-up from a software development team created during a Project at the Faculty of Mathematics and Physics of the Charles University (MFF UK), to an operating software company which introduces its own products to the European mass market. The author then takes a think about the future of this company. The Thesis describes this process from the side of finances, negotiations with potential investors, company management, project management, software developers' team, human resources, and behavior towards clients, marketing, and other necessary activities which had to be managed during the process. Each chapter corresponds to one phase of the company startup process and consists from a solved project description, history of that project, management, financing and human resources issues during that phase. Each chapter ends with the evaluation of the phase and shows the possibilities for a follow-up. The Thesis attempts to evaluate the knowledge learned during the study at MFF UK and confronts it with the practical experiences from the view of a company manager. The Thesis tries to indicate possible shortcomings in education of managing officers and to find ways how these shortcomings could be eliminated. The author pretends to make this confrontation with...
Topological analysis of computer network threats
Řeháková, Jaroslava Antea ; Jirovský, Václav (advisor) ; Trčka, Martin (referee)
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this project, we describe a tool that implements a topological approach to network vulnerability analysis. Out TAU Model includes modeling of network security conditions and attack techniques with use of preconditions/postconditions dependencies. An important part of TAU Model is The Graph of Dependencies that is used for creating exploit sequences leading to specifics attack goals. This representation enables highly scalable methods of vulnerability analysis, such as discovering security flaws of given network configuration. An important subject of this project is discussion about complexity and stopping of TAU Model computation. We also mention future extension possibilities and technical challenges.

National Repository of Grey Literature : 23 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.