National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
IoT Security
Hanzlíček, Martin ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work focuses on the problematic of the Android Wear platform security. The work solves the question of the time-consumption of calculations with big numbers, modular arithmetic and cryptography of this platform. Furthermore, solves the work the question of the communication with mobile devices and the authentication protocol client-server. The outputs of the work are three applications. The first application is suitable for Android Wear and it tests the time-consumption of particular calculations, communication with a mobile device and it also works as the issuer to the user registration and verification. The second application is for Android. The main function is the user registration and user’s authentication in cooperation with the application on the Android Wear platform and the computer application. The last application is suitable for computer and it works as the finisher of the registration and its authentication.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
IoT Security
Hanzlíček, Martin ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work focuses on the problematic of the Android Wear platform security. The work solves the question of the time-consumption of calculations with big numbers, modular arithmetic and cryptography of this platform. Furthermore, solves the work the question of the communication with mobile devices and the authentication protocol client-server. The outputs of the work are three applications. The first application is suitable for Android Wear and it tests the time-consumption of particular calculations, communication with a mobile device and it also works as the issuer to the user registration and verification. The second application is for Android. The main function is the user registration and user’s authentication in cooperation with the application on the Android Wear platform and the computer application. The last application is suitable for computer and it works as the finisher of the registration and its authentication.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.