National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Temporal and Data Characteristics Acquisition of Network Connections
Kramoliš, Petr ; Kaštovský, Petr (referee) ; Žádník, Martin (advisor)
This thesis deals with design and implementation of software tools for an acquisition of temporal and data characteristics of network connections. This thesis uses platform of flexible FlowMon and acceleration cards COMBOv2.
Certification authority
Herinek, Denis ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
There is a lot of available services on the internet those need to be more secured and trusted. Public key infrastructure is used in sectors where are higher expectations in case of authentication, integrity and confidentality. It is almost impossible to imagine how internet banking or electronic signatures of important documents would work without PKI. There is a lot of open-source realisations of PKI created by users. Digital certificates as a part of PKI are issued by certificate authorities. This diploma thesis consists of open- source realisation of certificate authority and timestamping authority to demonstrate services which they provide.
Application for digital signature and timestamping
Remiaš, Miroslav ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
In general, the Internet represents an unsecured medium of data transfer. Besides the rising popularity of the Internet, the matters of safety are getting to the foreground of importance. Anybody would be able to gain access to the computer network or to other valuable information if no algorithm of verifying the genuineness of identity were used. It is necessary to secure not only the access to the documents but also the content itself, which could be modified during the transfer through an unsecured medium. Last but not least, without the discretion provided by cryptography, the information may become literally public. To provide security and protection for the communicating participants the problems mentioned above are solved with the help of cryptographic techniques. The verification of the identity and the integrity of messages, the credibility of document’s ownership and safe data transfer through an unsecured medium are all the aspects, which the field of communication security on the Internet, thus the public key infrastructure, deals with. The electronic signature, as a part of the security area, is one of many advertised themes nowadays in Czech Republic. The aim of this master’s thesis is to acquaint the reader with the necessary technological procedures of digital signature, such as cryptographic techniques, public key infrastructure and timestamp. The practical part of this thesis consists of a suggested implementation of a web application in the programming language ASP.NET, which forms a certification authority with an opportunity of claiming a timestamp to authorize timestamps. After the problematic of cryptography was explained in the first chapter, the term of electronic signature has been introduced in the second chapter. Very important information, as far as the electronic signature of documents is concerned, is the time of the document’s creation and the subsequent signature verification by an appropriate authority. So the following part of the thesis is dedicated to the timestamp and to the authority of its verification. The fourth section deals with the large scale of public key infrastructure. The fifth part focuses on the description of the support for the whole problem mentioned so far using Microsoft’s programming language ASP.NET. The final sixth chapter represents the practical part of the thesis, namely the web application itself, where the individual modules of the application with its functions are described.
Implementation of Statistical Compression Methods
Beněk, Tomáš ; Polok, Lukáš (referee) ; Bařina, David (advisor)
This thesis deals with the statistical compression methods. This work describes basic theoretical introduction to the data compression and the most important representatives of statistical methods. There is also described compression process based on the Burrows-Wheeler algorithm, which is implemented in the form of portable library in C++ programming language. This work compares effectiveness of each method on suitable data corpus, which contains various data types and according to achieved results discusses suitability of usage of methods and possible improvements.
Trusted long-term digital archive
Mravec, Roman ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor's thesis is focused on problematics of long-term trusted preservation. Security and trustworthiness of electronic documents is one of the main aim of this research. Provides means needed to keep and maintain data integrity, non-repudiation, long-term readibility and legally-binding of electronic documents. Solves time resistant formats for archive data files. Contains design of trusted long-term archive based on valid laws and standards in field of electronic preservation.
Computer Identification Based on Packet's Timestamps
Krba, Martin ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
Basic way how to identify a device in computer network is by MAC address and IP address. Main goal of this work is to create an application capable of clear identification of devices in computer network regardless change of their MAC address or IP address. This is done by exploiting tiny deviations in hardware clock known as clock skew. They appear in every clock based on quartz oscillator. Using clock skew is beneficial, because there is no need of any changes in fingerprinted device nor their cooperation. Accessing these values is done by capturing packets with timestamps included. Application of this method is very wide, for example computer forensics, tracking the device using different access points or counting devices behind router with NAT.
Temporal and Data Characteristics Acquisition of Network Connections
Kramoliš, Petr ; Kaštovský, Petr (referee) ; Žádník, Martin (advisor)
This thesis deals with design and implementation of software tools for an acquisition of temporal and data characteristics of network connections. This thesis uses platform of flexible FlowMon and acceleration cards COMBOv2.
Certification authority
Herinek, Denis ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
There is a lot of available services on the internet those need to be more secured and trusted. Public key infrastructure is used in sectors where are higher expectations in case of authentication, integrity and confidentality. It is almost impossible to imagine how internet banking or electronic signatures of important documents would work without PKI. There is a lot of open-source realisations of PKI created by users. Digital certificates as a part of PKI are issued by certificate authorities. This diploma thesis consists of open- source realisation of certificate authority and timestamping authority to demonstrate services which they provide.
Trusted long-term digital archive
Mravec, Roman ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor's thesis is focused on problematics of long-term trusted preservation. Security and trustworthiness of electronic documents is one of the main aim of this research. Provides means needed to keep and maintain data integrity, non-repudiation, long-term readibility and legally-binding of electronic documents. Solves time resistant formats for archive data files. Contains design of trusted long-term archive based on valid laws and standards in field of electronic preservation.
Computer Identification Based on Packet's Timestamps
Krba, Martin ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
Basic way how to identify a device in computer network is by MAC address and IP address. Main goal of this work is to create an application capable of clear identification of devices in computer network regardless change of their MAC address or IP address. This is done by exploiting tiny deviations in hardware clock known as clock skew. They appear in every clock based on quartz oscillator. Using clock skew is beneficial, because there is no need of any changes in fingerprinted device nor their cooperation. Accessing these values is done by capturing packets with timestamps included. Application of this method is very wide, for example computer forensics, tracking the device using different access points or counting devices behind router with NAT.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.