Opis wybranych zagadnień z teorii liczb, teorii grup oraz teorii ciał skończonych, służących do analizy procesu uwierzytelniania. Charakterystyka funkcji jednokierunkowych i schematów podpisu wraz z ich zastosowaniami. Definicja uwierzytelniania, wybrane techniki uwierzytelniania, uwierzytelnianie z wiedzą zerową wraz z przykładami, przykładowe protokoły uwierzytelniania, takie jak schemat identyfikacji Schnorra i schemat identyfikacji Guillou-Quisquatera.Description of selected topics from the number theory, the group theory and the Galois theory, which are used for the analysis of the authentication process. Structural properties of one-way functions and signature schemes. Definition of authentication, the selected methods of authenticati...
The rationale of authentication has been a topic of study for about a decade and a half. First attem...
In [10], we introduce a process calculus for describing security protocols and we propose a static a...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
Identifikacija nam je potrebna zbog sprječavanja krađe identiteta kod razmjene podataka na daljinu. ...
Tema završnog rada je analiza autentifikacijskih protokola, odnosno njihove sigurnosna ana...
The main focus of Master’s thesis is modern methods for user authentication. In the first part are b...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
Computer security is a field of computer science concerned with the control of risks related to comp...
Popis základních principů a pravidel autentizace v počítačových sítích. Charakterizace principu aute...
2017 - 2018Entity authentication is the process allowing a user, in a distributed system, to gain co...
this report). This report describes what sorts of protocols have been specified and outlines what me...
Authentication protocols are constructed using certain fundamental security mechanisms. This paper d...
This standard specifies two challenge-response protocols by which entities in a computer system may ...
Abstract. We study the roles of message components in authentication protocols. In particular, we in...
In this paper I examine the possibilities of subject authentification, cryptographic methods of auth...
The rationale of authentication has been a topic of study for about a decade and a half. First attem...
In [10], we introduce a process calculus for describing security protocols and we propose a static a...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
Identifikacija nam je potrebna zbog sprječavanja krađe identiteta kod razmjene podataka na daljinu. ...
Tema završnog rada je analiza autentifikacijskih protokola, odnosno njihove sigurnosna ana...
The main focus of Master’s thesis is modern methods for user authentication. In the first part are b...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
Computer security is a field of computer science concerned with the control of risks related to comp...
Popis základních principů a pravidel autentizace v počítačových sítích. Charakterizace principu aute...
2017 - 2018Entity authentication is the process allowing a user, in a distributed system, to gain co...
this report). This report describes what sorts of protocols have been specified and outlines what me...
Authentication protocols are constructed using certain fundamental security mechanisms. This paper d...
This standard specifies two challenge-response protocols by which entities in a computer system may ...
Abstract. We study the roles of message components in authentication protocols. In particular, we in...
In this paper I examine the possibilities of subject authentification, cryptographic methods of auth...
The rationale of authentication has been a topic of study for about a decade and a half. First attem...
In [10], we introduce a process calculus for describing security protocols and we propose a static a...
This thesis is focused on authentication methods, for regular private users and company solutions. B...