National Repository of Grey Literature 16 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
Multifactoral Authentication of Electronic Documents
Gancarčík, Lukáš ; Kodl,, Jindřich (referee) ; Smejkal, Vladimír (advisor)
The aim of the thesis is to provide complete information regarding electronic documents and possibilities of their usage. The focus is concentrated on the area of authentication, which specifies the possibility of obtaining authentication information and describes the authentication processes itself. The diploma thesis also deals with the suggestion of multifactor authentication of electronic documents for the selected company.
Methods of Authentication to WiFi Network
Valašek, Filip ; Kašpárek, Tomáš (referee) ; Lampa, Petr (advisor)
This diploma thesis deals with authentication using RADIUS protocol and authentication methods in accordance with standard IEEE 802.1X. At the beginning there are shortly characteristics of chosen authentication methods, such as CHAP, PAP and some EAP types. Document includes summary of RADIUS protocols implementations, especially the FreeRADIUS server. Our goal is to implement a management tool to adminitrate FreeRADIUS server.
Authentication in Smart Grids
Janáč, Richard ; Šťastný, Ladislav (referee) ; Franek, Lešek (advisor)
This thesis is dealing with the possibilities of authentication of service engineers for Smart Grid network devices. The aim was to select the most appropriate type of authentication security token. Therefore, we examined the main principals of cryptography and described the algorithms used in the security token. At the end of the paper, the main three types of security tokens are compared. Further, the paper evaluates their use in equipment for the implementation of Smart Grid networks and token selection for subsequent processing demonstration applications.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Contactless User Authentification Using Leap Motion Sensor
Lukáč, Jakub ; Beran, Vítězslav (referee) ; Najman, Pavel (advisor)
Contactless authentication of users has grown in popularity as a new technology. Recent findings in the field of computer vision and its applications have contributed to the emergence of new devices such as Leap Motion controller. This device is capable of precise recognition of hand positions and simple gestures identification. This paper presents an application of data gathered from controller's interface and using them for user identification. Proposed solution uses hand geometry to evaluate the recognition process where this accessible and inexpensive device can be used. Therefore, the user can easily benefit from this extra feature coming with the new device. To conclude, the results show overall accuracy over 99 % on a relatively small dataset.
Safe and Seamless Data Sharing
Višňovský, Michal ; Zobal, Lukáš (referee) ; Kolář, Dušan (advisor)
Antivirus companies together create a community network of sample sharing. Data sources are not unified and there exist many types of sharing principles. One of them is the system of Sampleshare, working on basis of the Norman Sample Sharing Framework. The current version is using deprecated technologies and is open to network threats. The main goal of the thesis is to create a reinterpretation of this system, without the clients noticing any changes and having to reconfigure their feeder scripts in a larger scale. The focus is also set to use the newest technologies in means of improving the overall safety of the application and its transfer protocol. The included web application provides user and sample package administration as well as monitoring of the host machine resources.
Secure Authentication and Access Control in Web Applications
Čižek, Martin ; Pecho, Peter (referee) ; Samek, Jan (advisor)
This thesis deals with security of web based applications and their access controlling. The work describes security of applications in WWW environment and security elements that help us to secure those systems against possible attacks. Authentication methods used in PHP applications are described in more detailed way with their advantages and disadvantages with consideration on security and usability.
Safe and Seamless Data Sharing
Višňovský, Michal ; Zobal, Lukáš (referee) ; Kolář, Dušan (advisor)
Antivirus companies together create a community network of sample sharing. Data sources are not unified and there exist many types of sharing principles. One of them is the system of Sampleshare, working on basis of the Norman Sample Sharing Framework. The current version is using deprecated technologies and is open to network threats. The main goal of the thesis is to create a reinterpretation of this system, without the clients noticing any changes and having to reconfigure their feeder scripts in a larger scale. The focus is also set to use the newest technologies in means of improving the overall safety of the application and its transfer protocol. The included web application provides user and sample package administration as well as monitoring of the host machine resources.
Contactless User Authentification Using Leap Motion Sensor
Lukáč, Jakub ; Beran, Vítězslav (referee) ; Najman, Pavel (advisor)
Contactless authentication of users has grown in popularity as a new technology. Recent findings in the field of computer vision and its applications have contributed to the emergence of new devices such as Leap Motion controller. This device is capable of precise recognition of hand positions and simple gestures identification. This paper presents an application of data gathered from controller's interface and using them for user identification. Proposed solution uses hand geometry to evaluate the recognition process where this accessible and inexpensive device can be used. Therefore, the user can easily benefit from this extra feature coming with the new device. To conclude, the results show overall accuracy over 99 % on a relatively small dataset.

National Repository of Grey Literature : 16 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.