National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
IoT Security
Hanzlíček, Martin ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work focuses on the problematic of the Android Wear platform security. The work solves the question of the time-consumption of calculations with big numbers, modular arithmetic and cryptography of this platform. Furthermore, solves the work the question of the communication with mobile devices and the authentication protocol client-server. The outputs of the work are three applications. The first application is suitable for Android Wear and it tests the time-consumption of particular calculations, communication with a mobile device and it also works as the issuer to the user registration and verification. The second application is for Android. The main function is the user registration and user’s authentication in cooperation with the application on the Android Wear platform and the computer application. The last application is suitable for computer and it works as the finisher of the registration and its authentication.
Privacy protection on the internet
Lučenič, Lukáš ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
In this bachelor thesis are analyzed social networks and their security, methods of obtaining information from users and examples of Internet crime. The second part describes authentication methods and authentication protocols. The final section describes a principled own proposal anonymous authentication protocol.
Identification and authentication technologies
Miklánková, Zuzana ; Lieskovan, Tomáš (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the analysis of currently available RFID technologies and smart cards. Summarized are types of identification and authentication radio or contact systems. The practical part compares measured RFID functional outputs and describes the implementation of multi-attribute authentication system using RFID technology and smart cards. For example, the authentication system can provide employees with access to the building, necessarily demonstrated by both the smart card and RFID tags.The system also includes user privacy elements, where identity of the user cannot be detected by captured communication.
Traffic Analysis of Network Protocols Kerberos, NTLM, and SAML 2.0
Krůl, Michal ; Orsák, Michal (referee) ; Tisovčík, Peter (advisor)
This thesis engages the problem consisting of analysis and detection of the attacks carried out on the authentication protocols in the environment of network structures, like those used in big corporations. In~this thesis, the problem is examined in the light of the netflow analysis. Main content of the thesis is a simulation of the attacks targeting network architectures, where the authentication is served by mentioned protocols, and effort to detect these attack by the netflow monitoring. The outcome of this thesis is a draft, how to automatically detect the attacks carried out in the network structures, and plugin for the exporter of the Flowmon sond, the product of Flowmon Networks company, which will be extracting the information needed for the performance of the detection.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Authentication protocols on restricted devices
Šebesta, David ; Člupek, Vlastimil (referee) ; Malina, Lukáš (advisor)
This thesis deals with authentication methods, especially about authentication based on knowledge. In the thesis, the hash functions such as MD hash function, SHA hash function, Keccak, Blake, Grostl, Jh, Skein are described and shown their compilation on low frequency microcontrollers. Into the microcontroller MSP430F2274 are Keccak, Blake, Grostl, JH, md5, SHA–1, SHA–224, SHA–256 a Skein hashing algorithms implemented and measured. Also simple authentication protocols client–server are designed and their implementation and measuring was done. Protocols are focused on low memory requirement and the smallest number of measured messages during authentication. The first solution is determined for the beginning of the communication from client and the second from server.
Traffic Analysis of Network Protocols Kerberos, NTLM, and SAML 2.0
Krůl, Michal ; Orsák, Michal (referee) ; Tisovčík, Peter (advisor)
This thesis engages the problem consisting of analysis and detection of the attacks carried out on the authentication protocols in the environment of network structures, like those used in big corporations. In~this thesis, the problem is examined in the light of the netflow analysis. Main content of the thesis is a simulation of the attacks targeting network architectures, where the authentication is served by mentioned protocols, and effort to detect these attack by the netflow monitoring. The outcome of this thesis is a draft, how to automatically detect the attacks carried out in the network structures, and plugin for the exporter of the Flowmon sond, the product of Flowmon Networks company, which will be extracting the information needed for the performance of the detection.
Identification and authentication technologies
Miklánková, Zuzana ; Lieskovan, Tomáš (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the analysis of currently available RFID technologies and smart cards. Summarized are types of identification and authentication radio or contact systems. The practical part compares measured RFID functional outputs and describes the implementation of multi-attribute authentication system using RFID technology and smart cards. For example, the authentication system can provide employees with access to the building, necessarily demonstrated by both the smart card and RFID tags.The system also includes user privacy elements, where identity of the user cannot be detected by captured communication.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
IoT Security
Hanzlíček, Martin ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work focuses on the problematic of the Android Wear platform security. The work solves the question of the time-consumption of calculations with big numbers, modular arithmetic and cryptography of this platform. Furthermore, solves the work the question of the communication with mobile devices and the authentication protocol client-server. The outputs of the work are three applications. The first application is suitable for Android Wear and it tests the time-consumption of particular calculations, communication with a mobile device and it also works as the issuer to the user registration and verification. The second application is for Android. The main function is the user registration and user’s authentication in cooperation with the application on the Android Wear platform and the computer application. The last application is suitable for computer and it works as the finisher of the registration and its authentication.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.