National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Communication protocol for messenger
Bílý, Ondřej ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
Bachelor‘s discuss on theme Communications protocol for messenger and his security. The introduction analysis the basic points of cryptographic security of data. Next two parts deals with the two most used architectures in the area of information network, which helps in understanding of sending data by this network. Penult deals with the creation of the communication channel in between the applications in the information network.. The final part includes description of three uncomplicated applications. This demonstrates the use of various cryptographic securities and various protocols for the sending of information between the users.
Access control system for carsharing application
Texl, Filip ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is devoted to access systems with an emphasis on carsharing applications, both from a theoretical point of view, where it analyzes their advantages and disadvantages and uses cryptographic primitives, and also from a practical point of view, where the practical part includes the design of an access system and its subsequent implementation. Bluetooth Low Energy technology and Near field communication are also used in the bachelor thesis, which is again described from a theoretical point of view, especially the key concepts of these technologies, as well as its practical use for access systems.
Communication protocol for messenger
Bílý, Ondřej ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
Bachelor‘s discuss on theme Communications protocol for messenger and his security. The introduction analysis the basic points of cryptographic security of data. Next two parts deals with the two most used architectures in the area of information network, which helps in understanding of sending data by this network. Penult deals with the creation of the communication channel in between the applications in the information network.. The final part includes description of three uncomplicated applications. This demonstrates the use of various cryptographic securities and various protocols for the sending of information between the users.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.