National Repository of Grey Literature 273 records found  beginprevious124 - 133nextend  jump to record: Search took 0.01 seconds. 
Data archiving using blockchain technology
Řihánek, Tobiáš ; Sikora, Marek (referee) ; Člupek, Vlastimil (advisor)
This thesis dealt with the issue of data archiving. The aim was to explore the possibilities of using blockchain technology to address the security aspects of digital archiving, and then to design and implement an application that uses blockchain to secure data integrity. First, a theoretical analysis of both archiving and blockchain technology was conducted. Next, a web application was designed that uses this technology to detect integrity breaches. Based on the design, a system consisting of a web application written in JavaScript and an archiving application and a validation application written in Java was implemented. These applications communicate with each other and create a secure archiving system using blockchain. The functionality of the system was demonstrated and its security was tested.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá implementací a vytvořením kryptografické knihovny a grafického uživatelského rozhraní (GUI) pro nově navržený protokol "Smlouva o autentizačním klíči na základě Shamirova sdílení tajemnství" (ang. "Shamir’s Secret Sharing-based Authenticated Key Agreement", zkráceně ShSSAKA). Protokol je založený na principu AKA (autentizovaná domluva klíče), Schnorrově podpisu a rozšířen Paillierovým schématem pro možnost podílení se více zařízení na podpisu a autentizaci. Prezentovány jsou také benchmarky na osobním počítači a RaspberryPi.
Access control system using multilevel authentication
Cvrček, Tadeáš ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
The master's thesis focuses on authenticated key agreement protocols and their implementation on MultOS smart cards platform and devices running Google Android operating system. Implemented applications use NFC (Near Field Communication) interface for communication with cellphone, Bluetooth technology for communication with smart watch and smart card as SAM (Secure Access Module) module in a verifier role. The source code is universal, so it is possible to use it in other projects.
Selected problems of the czech media and journalistic profession on the exemple of the intrusion of fictitious events and news satire into official news
Seidlová, Tereza ; Škodová, Markéta (advisor) ; Bednařík, Petr (referee)
This diploma thesis focuses on the problematic aspects of the journalistic profession nowadays, namely on the example of the penetration of the mystifying jokes to the mainstream media. In three specific cases where the authors of the mystifying pranks managed to penetrate the media, the work illustrates the most common mistakes journalists can make and focuses on trends, which stand for these tendencies. Part of this work is the analysis of the mystifying contents that appeared on jokes websites, on Facebook or in the context of interpersonal communication, and subsequent analysis of the media in which these mystifying reports appeared in the form of the real events. The interviews with both stakeholders - authors of the hoax contents and media representatives - will subsequently serve for the illustration of the overall issue and the final conclusion.
Signature-based User Authentication
Hámorník, Juraj ; Jančík, Pavel (advisor) ; Moško, Juraj (referee)
This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Signatures similarity is calculated by dynamic time warp on dynamic signature features such as speed, acceleration and pressure. User access token is used by our Windows login plugin called signature credential provider to decrypt user credentials and perform log in. Result of this work is solution that allow user log to windows by handwritten signatures, with equal error rate of 4.17\%.
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Beran, Karel (advisor) ; Cvrček, František (referee) ; Polčák, Radim (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany
Kment, Vojtěch ; Tryzna, Jan (referee)
Electronic Legal Transaction: Comparative analysis with emphasis on the use of electronic signature under the EU law and laws of the Czech Republic and Germany Abstract (English) Objectives. This thesis provides a comparative analysis of electronic legal transactions under the EU law and laws of the Czech Republic and Germany, while emphasising the utilisation of higher versions of electronic signature, especially of a qualified electronic signature, which has legal effects of a handwritten signature in legal transactions performed by electronic means (Chapters 6 to 10). At the same time, increased attention is also paid to entirely novel concepts of advanced and qualified electronic seal, which are intended exclusively for use by juristic persons. The laws under scrutiny are based especially on recently adopted Regulation (EU) No 910/2014, known as eIDAS. To provide a general background, the comparative analysis is preceded by a theoretical part (Chapters 2 to 4, partially Chapter 5), dealing with the concept of legal transactions (also termed "legal acts" or "legal action") in general, while also focusing on the traditional handwritten signature and its functions, especially in view of the German and Czech legal doctrines and with occasional references to common law, as well as to requirements ensuing...
Relevance of Usable Security Guidelines from IT Professional Point of View
Galanská, Katarína ; Polčák, Libor (referee) ; Malinka, Kamil (advisor)
Vyvážení bezpečnosti a použitelnosti bylo vždy výzvou. Navzdory důležitosti zabezpečení softwaru jsou bezpečnostní pokyny a standardy často příliš komplikované, náchylné k chybám nebo časově náročné. Tato nerovnováha iniciovala vznik pojmu použitelné bezpečnosti. Po celá léta to byl běžný výzkumný problém. Zatímco softvér by měl být vyvíjen s ohledem na použitelnost koncových uživatelů, bezpečnostním standardům a směrnicím, které používají IT profesionálové, není z hlediska použitelnosti často věnována dostatečná pozornost. Vzhledem k tomu, že se od odborníků v oblasti IT očekává vyšší úroveň znalostí, často čelí velmi složitým oblastem, když se snaží vyhovět konkrétním bezpečnostním standardům nebo dodržovat konkrétní pokyny. Tato práce představuje studium současného povědomí v oblasti použitelné bezpečnosti. Práce sestává z provedeného průzkumu, analýzy stávajících použitelných bezpečnostních pokynů a navrhuje vzdělávací pomůcku k řešení problémů, které výzkum přinesl. Hodnocení vzdělávací pomůcky ukázalo pozitivní dopad na povědomí IT odborníků.
Authorization and Authentication Solutions on the Java Platform
Geffert, Maroš ; Rychlý, Marek (referee) ; Burget, Radek (advisor)
The aim of this work is to analyze the current authentication and authorization libraries on the Java platform and create a web application that supports user authentication, including multi-phase authentication (MFA), user and group authorization and is resistant to the most common attacks. I performed an analysis of existing solutions and based on best practises, I created my own solution. As an implementation language I used Java 11 and libraries Spring Framework, Spring Security, MyBatis and a tool for sending HTTP queries Postman. The implemented service satisfy the set criteria, while I tested the functionality of the proposed solutions and the time-consuming process of access control.
Security of authentication protocols
Tran, Minh ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
This thesis deals with the security of authentication protocols. The aim of the thesis is to analyze current security threats and attacks on current card systems mainly JavaCard and Mifare. And then to create a mobile application using Android platform with NFC and HCE functions, which realises the founded attacks. These attacks are relay attack and card cloning. Mobile side of the application is written in Kotlin programming language and server side in JavaScript, EJS and CSS. In the end attacks on EMV and access system of an unnamed university are demonstrated.

National Repository of Grey Literature : 273 records found   beginprevious124 - 133nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.