National Repository of Grey Literature 21 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Compiler of State Diagram Language to CHILL Language
Goldmannová, Zuzana ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the grammar of an existing proprietary state diagram language, which is used to simulate state diagrams employed in telephone exchanges. The goal of this work is to analyze the grammar and existing compiler of this language to CHILL language and also to design and implement a new compiler. This new compiler will be easier to manage and will eliminate errors and imperfections of the current arrangement. Finally this compiler is tested using existing files, that were formerly created for the current compiler, and also using files I created for testing purposes.
Context-Dependent Scanner
Hatina, Peter ; Koutný, Jiří (referee) ; Čermák, Martin (advisor)
This paper is devoted to principles of a lexical analysis and to a means of context resolution of a lexeme type, depending on its source code position. The lexical analysis, process of a lexical analyzer creation and possible solution for context lexeme recognition, based on a multiple automata system, is described. Lexical analyzer functionality is extended to accept tokens in other languages code blocks.
Design and implementation of authentication method for accessing web service in PHP language
Pokorný, Jiří ; Kacálek, Jan (referee) ; Uchytil, Stanislav (advisor)
Bachelor's thesis describes the available principles of authentication for access to Web services. It compares necessary hardware, safety, financial costs, complexity of implementation and difficulty of maintenance and service. The second part deals with the design and implementation of a particular authentication method for access to Web applications in PHP using the MySQL relational database. There is selected the authentication method by SMS code with regards to mentioned characteristics of particular methods. It is also supplemented by the possibility of using a client certificate.
Application for Demonstration of Synchronization Mechanisms in Distributed Systems
Klimčíková, Lenka ; Veigend, Petr (referee) ; Zbořil, František (advisor)
The aim of this thesis is to design and create a web application for the demonstration of selected synchronization mechanisms in distributed systems. The algorithms communicate by means of message-passing to ensure mutual exclusion of the processes in an effort to access the critical section. Implemented are Lamport's algorithm, Maekawa's algorithm, Raymond's algorithm and Suzuki-Kasami broadcasting algorithm. The application is implemented in Java programming language with the use of Spring Boot framework for listening on different endpoints. Thymeleaf template engine is used to exchange the necessary data between backend and frontend of the application. HTML + JavaScript language are used for dynamic rendering of sent messages to the screen. The algorithms are implemented in separate libraries, which are then used by the web application. The application illustratively demonstrates function of each algorithm with loads of different examples for the best possible understanding. It's primarily intended for students of Faculty of Information Technology, Brno University of Technology
Non-Fungible Tokens (NFTs): A hype or hope? Analysis of random NFT portfolios
Iordosopol, Ana ; Krištoufek, Ladislav (advisor) ; Nechvátalová, Lenka (referee)
This thesis reflects on the newly emerged alternative asset class of non-fungible tokens (NFTs). We perform both qualitative and quantitative analyses on the matter. In the empirical part, we construct different types of random portfolios to investigate the performance of cryptocurrency- based portfolios after the possible inclusion of NFTs in such. Our results suggest that as of the end of 2022, portfolios of Bitcoin and Ether perform better without NFTs, thus rejecting the previous assumptions of limited diversification potential of NFTs, which was detected during the last crisis period during the COVID-19 pandemic. The qualitative analysis on the topic, however, suggests that NFTs are not just the hype and the innovative blockchain solutions that NFTs represent may be of greater use in the near future. Therefore, despite of non-efficiency of NFTs as a financial asset in 2022, they still display significant potential as a disruptive technology. Keywords NFT, Cryptocurrency, Random portfolio, Blockchain, Non-fungible token. Title Non-Fungible Tokens (NFTs): A hype or hope? Analysis of random NFT portfolios.
Application for Demonstration of Synchronization Mechanisms in Distributed Systems
Klimčíková, Lenka ; Veigend, Petr (referee) ; Zbořil, František (advisor)
The aim of this thesis is to design and create a web application for the demonstration of selected synchronization mechanisms in distributed systems. The algorithms communicate by means of message-passing to ensure mutual exclusion of the processes in an effort to access the critical section. Implemented are Lamport's algorithm, Maekawa's algorithm, Raymond's algorithm and Suzuki-Kasami broadcasting algorithm. The application is implemented in Java programming language with the use of Spring Boot framework for listening on different endpoints. Thymeleaf template engine is used to exchange the necessary data between backend and frontend of the application. HTML + JavaScript language are used for dynamic rendering of sent messages to the screen. The algorithms are implemented in separate libraries, which are then used by the web application. The application illustratively demonstrates function of each algorithm with loads of different examples for the best possible understanding. It's primarily intended for students of Faculty of Information Technology, Brno University of Technology
The Law and Regulation of ICO (Initial Coin Offering)
Kandrík, Maroš ; Kotáb, Petr (advisor) ; Kohajda, Michael (referee)
The Law and Regulation of ICO (Initial Coin Offering) Abstract This diploma thesis deals with legal analysis of ICO (Initial Coin Offering) and legal analysis of tokens that are issued within an ICO. The thesis aims to find out whether and to what extent an ICO is subjected to initial public offering law and whether the tokens can be characterized as things, securities, dematerialized securities, and electronic money. In the first part of the thesis, I define the basic concepts and terms. Definitions and terms are supplemented by the technical and economic background of each respective institute. The first part also briefly summarizes the historical development of ICO, which shaped it into its present form. The second part of the thesis deals with the legal categorization of tokens. Firstly conceptual features of the thing in the legal sense, dematerialized security, security, and electronic money are established. Subsequently, it is examined whether the tokens can fall within these conceptual features or not. In the chapter regarding securities, it is pointed out that different understanding of securities in public and private law may have some negative consequences. The analysis of the contractual relationship between the issuer and the investor is also addressed in the second part. In the third part, ICO...
Choose authentication method for logging in to the electronic banking at the same time as cancellation of GRID cards authentication
Mazák, Matej ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
The aim of this Master thesis is to choose appropriate authentication method for logging in to the electronic banking. The chosen solution will serve as an additional factor for authentication and authorization of client and at the same time as the replacement of the outdated security method GRID card. Development and direction of the electronic banking is explained in the theoretical part of the thesis. Further on, the advantages of this channel that are provided to clients and bank, are described. Some of the trends which daily affect the direction of the electronic banking are also described. Security is very important part of the electronic banking and that is why it is mentioned in the each part of this thesis. The practical part contains proposed cancellation procedure of GRID cards and proposal of the new solutions that could replace them in the future. It also contains selection and description of evaluation criteria and multi-criteria evaluation of the selected solutions. Saaty method and scoring method were used to determine the weight of the particular criteria. Conclusion of the thesis compares achieved results of the individual authentication methods and assets of this Master thesis.
Uncomplemented postnominal adjectives
Mervová, Lenka ; Šaldová, Pavlína (advisor) ; Čermák, Jan (referee)
The thesis provides a quantitative survey and a detailed description of noun postmodification by single uncomplemented adjectives, i.e. cases where a modifying adjective phrase represented only by an adjective follows a head noun. The theoretical background of this thesis is based mainly on Randolph Quirk et al.'s A Comprehensive Grammar of the English Language (1985). The data for empirical corpus based research have been drawn from the British National Corpus by the means of a corpus query extracting the sequence noun+adjective+verb. This query returned 6,413 concordance lines out of which, after manual assessment, the resultant sample of 4,627 examples was compiled. The data obtained were further examined and categorized, revealing that up to eleven categories are needed to account for the syntactic, semantic, pragmatic factors, and other communicative implications and lexicalized conventions that motivate the use the postnominal position.

National Repository of Grey Literature : 21 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.