National Repository of Grey Literature 9 records found  Search took 0.01 seconds. 
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Secured data transfer between client and server using hessian protocol
Hořejš, Jan ; Uher, Václav (referee) ; Burget, Radim (advisor)
The objective of this work was the choice and creating of a secure communication protocols between server and a client in order to transmit sensitive medical data through an unsecured network. The first part is focused on a theoretical description and the properties of both client and server applications, metaprotocols, their purpose and thein appropriate use. The second part describes creation of secure communication and creation of demonstration application for secure data transmission. It is demonstrated by setting the server, creation of client applications and compilation of the certificate, including its installation.
Applied Cryptography in IoT
Ilyushchenkov, Maxim ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is devoted to security in IoT systems. The thesis describes the IoT architecture, how to ensure its security and various types of attacks on IoT devices. Subsequently, the protection of personal data IoT and solutions for its protection are described. The work also describes the MQTT technology, its principle of operation, architecture and basic elements. The practical part describes the implementation of the publisher and subscriber, who communicate using encrypted messages. Afterwards, the eciespy library is described, which enables encryption and decryption of messages. The method of communication between the server and the client using the TLS protocol and certificate exchange is also described. Finally, there is a solution for implementing secure communication between microcomputers using MQTT.
Applied Cryptography in IoT
Ilyushchenkov, Maxim ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is devoted to security in IoT systems. The thesis describes the IoT architecture, how to ensure its security and various types of attacks on IoT devices. Subsequently, the protection of personal data IoT and solutions for its protection are described. The work also describes the MQTT technology, its principle of operation, architecture and basic elements. The practical part describes the implementation of the publisher and subscriber, who communicate using encrypted messages. Afterwards, the eciespy library is described, which enables encryption and decryption of messages. The method of communication between the server and the client using the TLS protocol and certificate exchange is also described. Finally, there is a solution for implementing secure communication between microcomputers using MQTT.
Demonstration and Analysis of HTTPS Attacks
Murgaš, Adam ; Malinka, Kamil (referee) ; Ryšavý, Ondřej (advisor)
Cieľom tejto práce je analyzovať dva útoky na protokol HTTPS, najmä útoky BEAST a CRIME. Hlavnou pointou práce je zistiť, či sú tieto útoky stále možné s dnešnými technológiami, a zároveň demonštrovať ako tieto útoky funguju a ako sa podobným útokom vyhnúť alebo ako ich včas detekovať. Táto práca opisuje teoretický základ týchto útokov a taktiež opisuje možné riešenia pre detekciu a prevenciu. Po teoretickom základe a spôsoboch prevencie, táto práca taktiež poskytuje demonštráciu princípov týchto útokov a taktiež dataset, ktorý sa zameriava na určité metriky útoku, aby mali čitatelia lepšiu znalosť o princípoch za týmito útokmi, pretože podobné útoky by mohli byť objavené v budúcnosti.
Applied Cryptography in IoT
Ilyushchenkov, Maxim ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is devoted to security in IoT systems. The thesis describes the IoT architecture, how to ensure its security and various types of attacks on IoT devices. Subsequently, the protection of personal data IoT and solutions for its protection are described. The work also describes the MQTT technology, its principle of operation, architecture and basic elements. The practical part describes the implementation of the publisher and subscriber, who communicate using encrypted messages. Afterwards, the eciespy library is described, which enables encryption and decryption of messages. The method of communication between the server and the client using the TLS protocol and certificate exchange is also described. Finally, there is a solution for implementing secure communication between microcomputers using MQTT.
Applied Cryptography in IoT
Ilyushchenkov, Maxim ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is devoted to security in IoT systems. The thesis describes the IoT architecture, how to ensure its security and various types of attacks on IoT devices. Subsequently, the protection of personal data IoT and solutions for its protection are described. The work also describes the MQTT technology, its principle of operation, architecture and basic elements. The practical part describes the implementation of the publisher and subscriber, who communicate using encrypted messages. Afterwards, the eciespy library is described, which enables encryption and decryption of messages. The method of communication between the server and the client using the TLS protocol and certificate exchange is also described. Finally, there is a solution for implementing secure communication between microcomputers using MQTT.
Secured data transfer between client and server using hessian protocol
Hořejš, Jan ; Uher, Václav (referee) ; Burget, Radim (advisor)
The objective of this work was the choice and creating of a secure communication protocols between server and a client in order to transmit sensitive medical data through an unsecured network. The first part is focused on a theoretical description and the properties of both client and server applications, metaprotocols, their purpose and thein appropriate use. The second part describes creation of secure communication and creation of demonstration application for secure data transmission. It is demonstrated by setting the server, creation of client applications and compilation of the certificate, including its installation.
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.