National Repository of Grey Literature 26 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
Authentication of web service users
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
In this bachelor thesis are presented methods for Single Sign-On from perspective of client application. It takes a closer look at protocols OpenID and OAuth and explains the main differencies. Next part of the thesis is focused on registration of application and communication between server and client application. This is realized by OAuth protocol. In the practical part is described a created web application and used methods are explained.
Low-level data reading from computer data storages
Šalko, Jaroslav ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The following work is topically focusing on data restore of selected memory devices. It could be divided into two theoretical parts and one practical. The first part consist explanation of these memory media’s structure, the mechanism of their storage and also how operating system approaches these data. This relates also to a file system, which is among with its most commonly used types described there as well. In the second theoretical part the study focuses on the storage damage problematics. Various types of damage are shown and I examine how we could approach them. The work concentrates on possibilities which owners of the damaged storage media have with an emphasis on specialized companies. Therefore the study contains brief information of four selected domestic companies which are offering data restore on the Czech market. The complete list of services, which these companies offer to their customers, is shown in the chart found by the end of chapter. The second option in order of solving media damage problems are freeware programmes. On the basis of an internet poll dealing with the topic „best programmes for data restore“, I have chosen three programmes to be examined. The examination consisted of uploading certain files on the media storage which was formated by high level method afterwards. Through these three programmes I tried to restore the lost data. The results are included in a chart found by the end of each sub-chapter. The practical part of my work deals with linux program for data restore DDrescue. My effort consists of developing and creating an user friendly interface with intuitive manipulation of this helpful tool. My goal is thus spreading this program into the public and providing them simple tool for efficient low-level data restore.
System for anonymous transmit of messages
Kislinger, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Client-server password manager
Myška, Vojtěch ; Burda, Karel (referee) ; Ležák, Petr (advisor)
This bachelor thesis deals with implementation password manager with client-server architecture. Basis of thesis is proposal of graphical user interface, used keys, remote methods, server and its database, choise of used technology and programming language. The next part delas with implementation proposal of password manager.
Test implementation of the ACP protocol
Ležák, Petr ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
In general this master’s thesis deals with access control methods and their individual modules and in particular with authentication of supplicants. There are listed authentication methods useful in the implementation of the ACP protocol. ACP protocol is also discussed including possibilities and uses. ACP message format is described in detail with AVP format and types. The transaction mechanism is also mentioned here. The main part of the thesis is focused on software design for protocol testing. Possibilities of the testing are discussed and test scenarios are suggested. Consequently, requirements for test software are listed and its implementation is designed. Furthermore, there is technical documentation of the program. The main ideas used in the program are explained in it. The purpose of each part of the program is written including links between them. Finally, there is a manual for the program. It also contains an illustrative example describing how to make and test a simple scenario of the authentication.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
Effectivity of strategies for data backup
Šindler, Martin ; Ležák, Petr (referee) ; Burda, Karel (advisor)
This bachelor´s project is focused on efficiency of backups using mathematical models, which calculates overall capacity needed for backup and capacity required for complete recovery, it also compares availability of rotation schemes. Models are based on propability of data change in certain time interval specified as backup cycle. Models are implemented to the application, which can be used for choosing the best rotation scheme.
Collection of laboratory works for demonstration of computer attacks
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.

National Repository of Grey Literature : 26 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.