National Repository of Grey Literature 43 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
NFC technology and its security
Mertlík, Tomáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchange) data format, used for data transmitting. The next chapter is focusing on the analysis of the NFC vulnerability. It contains a possible attacks methods and solutions how to prevent them. The output of this paper is the projection and creation of an application, which allow sending an arbitrary data between two devices using the NFC technology. Additional Bluetooth technology can be used for larger files. In this case, NFC helps to create Bluetooth communication channel which is utilized for data transfer.
The use of artificial intelligence in cryptography
Lavický, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Goal of this thesis is to get familiar with problematics of neural networks and commonly used security protocols in cryptography. Theoretical part of the thesis is about neural networks theory and chooses best suitable type of neural network to use in cryptographic model. In practical part, a new type of security protocol is created, using chosen neural network.
Proposal of the secure network model
Kis, Matej ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The goal of this work was to create a design of a secured network infrastructure with decribing different ways of securing at ISO/OSI layers. Create a list of protocols which can be used to achieve a secured network design. In the theoretical part of this work the attention was placed to analyze possible solutions, which can be appllied in a practical part of the work. The practical part involves a design of a network topology and simulation. The part of the simulation was device configuration and network security testing.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.
System for anonymous transmit of messages
Kislinger, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
Land valuation methodologies by regulaions No. 441/2013 Coll. and No. 419/2013 Coll.
Rosenberg, Milan ; Klika, Pavel (referee) ; Hrubanová, Michaela (advisor)
This master`s thesis is dealing with parallel existence of two evaluating regulations. The first is the implementing regulation to evaluating property. Second of them is executive regulation to legal Senate arrangement of taxes on the acquisition of immovable property and the purpose of which is evaluating in Tax Offices. Thesis mainly occupies with methods of evaluation according to each of the regulations and their comparing. An essential part of this thesis is model examples, on which is demonstrated, what differences can be reached according to the regulations. The result of this thesis is a decision-making schema. This schema describes which of the regulations is more profitable during evaluating of lands and what the conditions of it are.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.
Program for risk management based on the Annualised Loss Expectancy method
Hlaváček, Jan ; Rosenberg, Martin (referee) ; Burda, Karel (advisor)
The object of this batchelor thesis was to create a program for managing risks by ALE method. The program is used to calculate the ALE in information systems, focus on medium-sized companies.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Effective Usage of Transmission Equipment in Education process
Rosenberg, Martin ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
The essential goal of my bachelor thesis was to propose effective usage of equipments, which are available for educational process in Accesses and Transports Networks course and elaborate tree laboratory exercises on these devices. All of my developed exercises contain detailed theoretical description, which is focused on actual thesis, layout of the exercise, block diagrams for better understanding of problem and detail instructions for individual measuring. After completion of guide, these exercises were remeasured and exemplary protocol was developed. The first task is processed with analyser PUMA 4300E. The main issue is to introduce the structure of E1 frame and measuring of pulse shape on E1 line to students. The second exercise is focused on analysis a structure of STS-1 frame, which is currently used in SONET networks. This practice is realized on TutorTIMS educational system. The last exercise is running on hardware version of this system, device TIMS 301. The goal is to introduce students the bit clock, regeneration of the bit clock and measuring quality of the bit clock. The last chapter is dedicated to device TIMS 301. The primary purpose of this chapter is to make the usage of the system more effective.

National Repository of Grey Literature : 43 records found   1 - 10nextend  jump to record:
See also: similar author names
4 Rosenberg, Martin
4 Rosenberg, Michal
4 Rosenberg, Milan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.