Lidé

Ing. Tomáš Vaněk, Ph.D.

Všechny publikace

VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation

  • Autoři: Klemsa, J., Dr. Mgr. Lukáš Kencl, Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. p. 1820-1825. ISSN 2324-9013. ISBN 978-1-5386-4387-7.
  • Rok: 2018
  • DOI: 10.1109/TrustCom/BigDataSE.2018.00275
  • Odkaz: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00275
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    A lot of effort has been made to devise a scheme for verifiable and privacy-preserving outsourcing of arbitrary computations. However, such schemes rely on Fully Homomorphic Encryption which is still far from practical. In our work, we instead focus solely on encryption schemes with single homomorphic operation, in particular addition. We define a rigorous framework that gives the data originator a possibility to check what values have been incorporated within provided homomorphic aggregate. We also propose a practical scheme that instantiates this framework and prove that it achieves Indistinguishability under Non-Adaptive Chosen Ciphertext Attack (IND-CCA1). The definition of our framework led us further to a straightforward modification of the security notions of Non-Malleability (NM) and Adaptive Chosen Ciphertext Attack (CCA2). Our modification aims at preventing trivial breach which is by principle unavoidable for plain homomorphic encryption. With our enhancement, the notions of security can serve as a novel security goal for any future verifiable homomorphic schemes.

Distributed Architecture of 5G Mobile Networks for Efficient Computation Management in Mobile Edge Computing

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Mobile cloud computing is a solution for offloading computation from mobile devices in order to overcome their major limitations: short battery life-time and limited computational power. However, the conventional centralized cloud with large server farms may result in a high delay of offloaded data transmission from the mobile device to the cloud and in congestion of backhaul due to offloading of high amount of data. These problems scale down the usage of common mobile cloud computing, especially for real-time services and applications. The perceived delay can be minimized by redeployment of computation resources to the edge of mobile network, for example, to the cloud-enabled base stations, as these are close to the users. To implement this new paradigm, the architecture of conventional mobile network must be enhanced with a computation management unit, which controls processing of offloaded tasks at cloud-enabled base stations. In order to reduce signaling delay and to minimize signaling load introduced by this concept, we introduce two options of new distributed deployments of the management unit. We also discuss integration of the proposed solution into 5G mobile networks based on C-RAN. By analysis and simulations of the proposed architectures, we proof that both signaling delay and signaling load could be significantly reduced comparing to centralized solutions.

In-Band Device-to-Device Communication in OFDMA Cellular Networks: A Survey and Challenges

  • DOI: 10.1109/COMST.2015.2447036
  • Odkaz: https://doi.org/10.1109/COMST.2015.2447036
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Direct communication between two or more devices without the intervention of a base station, known as device-to-device (D2D) communication, is a promising way to improve performance of cellular networks in terms of spectral and energy efficiency. The D2D communication paradigm has been largely exploited in non-cellular technologies such as Bluetooth or Wi-Fi but it has not yet been fully incorporated into existing cellular networks. In this regard, a new proposal focusing on the integration of D2D communication into LTE-A has been recently approved by the 3GPP standardization community as discussed in this paper. In cellular networks, D2D communication introduces several critical issues, such as interference management and decisions on whether devices should communicate directly or not. In this survey, we provide a thorough overview of the state of the art focusing on D2D communication, especially within 3GPP LTE/LTE-A. First, we provide in-depth classification of papers looking at D2D from several perspectives. Then, papers addressing all major problems and areas related to D2D are presented and approaches proposed in the papers are compared according to selected criteria. On the basis of the surveyed papers, we highlight areas not satisfactorily addressed so far and outline major challenges for future work regarding efficient integration of D2D in cellular networks.

Broadcast Security in Future Mobile Networks

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Elektronika ir Elektrotechnika. 2014, 20(10), 69-75. ISSN 1392-1215.
  • Rok: 2014
  • DOI: 10.5755/j01.eee.20.10.6392
  • Odkaz: https://doi.org/10.5755/j01.eee.20.10.6392
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    A typical broadcast authentication communication within information distribution systems is characterised by plain text communication between nodes, which do not mutually authenticate. Although, the authentication of every incoming message seems to be a very effective way to mitigate a denial of service type attack, such process results into an increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. This paper introduces a new improved delay and resource enhanced DREAM (IDARED) scheme, which is based on the DoS resistant efficient authentication mechanism (DREAM) and which provides lower latency results achieved by several parameters optimisation and a split verification queue concept for the end-to-end management data traffic in the next generation femtocell (NGF).

Increasing Robustness of Multi-homed Systems in Heterogeneous Environment

  • Autoři: Rohlík, M., Chlumský, P., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Advances in Electrical and Electronic Engineering. 2014, 12(4), 265-270. ISSN 1336-1376.
  • Rok: 2014
  • DOI: 10.15598/aeee.v12i4.1202
  • Odkaz: https://doi.org/10.15598/aeee.v12i4.1202
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Nowadays, packet error rate in fixed networks can be considered as a negligible value. However, the increasing requirements for transmission speed of mobile devices, heterogeneous technology, and other high frequency sources cause interference growth within the electromagnetic spectrum. This affects the overall reliability and throughput of the network and may cause undesirable operation malfunction of application-level services. Higher speeds can be achieved by advanced modulation techniques, but at the price of lower resistance against the interference. On the other hand, error-correcting codes or higher-level protocols are utilized to correct the delivery failures. We introduce a novel method for increasing robustness of communication for multi-homed systems in heterogeneous environment. Furthermore, we propose a security measure to ensure confidentiality, integrity and availability of the transmitted data without influencing the transmission parameters. Finally, we show positive impact of the proposed method on transmission efficiency and effective throughput, especially in networks with high probability of error occurrence.

New Trends in Femtocell Backhaul Security

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Przeglad Elektrotechniczny. 2013, 89(2b/2013), 240-244. ISSN 0033-2097.
  • Rok: 2013
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    One of the relatively new services presented by mobile operators is a femtocell. A femtocell is a network located at the residential premises helping to extend the mobile signal to places which are difficult to cover. Furthermore, it enables the mobile operator to provide attractive service to the customer since the femtocell is connected to the mobile operator network using an IP based backhaul link over the public Internet. To ensure appropriate security over the untrustworthy environment, an IPsec tunnel is established between the femtocell access point and the provider’s security gateway located at the core network perimeter. IPsec itself wasn’t originally proposed to carry small voice packets resulting in a redundant overhead. This paper examines other security procedures, such as transport layer security (TLS) and Datagram TLS (DTLS) protocols.

Klonování RFID čipů na přístupových kartách

  • Autoři: Holenda, M., Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: Access server. 2012, 10(7), 1-8. ISSN 1214-9675.
  • Rok: 2012
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Článek popisuje standardy a možné útoky na systém RFID používaný na Fakultě elektrotechnické Českého vysokého učení v Praze. Na konci článku je popsáno zařízení schopné emulovat antikolizní smyčku standardu ISO/IEC 14443A.

Alternative Protocols for Femtocell Backbone Security

  • Autoři: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: Proceedings of WMNC 2011. Piscataway: IEEE, 2011. pp. 1-4. ISBN 978-1-4577-1191-6.
  • Rok: 2011

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    The paper deals with simulation of the broadcast authentication protocol using Colored Petri Nets and further optimization in Matlab environment.

Broadcast Authentication Mechanism Optimization

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: 13th International Conference on Research in Telecommunication Technologies 2011 - Vol. II Poster Section. Brno: VUT v Brně, Fakulta elektrotechniky a komunikačních technologií, 2011. pp. II-40-II-43. ISBN 978-80-214-4283-2.
  • Rok: 2011
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network). Authentication of every incoming packet is effective way to mitigate an attack, however, it results in relatively increase of the end-to-end delay. To mitigate this drawback, special broadcast authentication protocols have been proposed. This paper deals with optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree topology and random tree topology.

Femtocell Backhaul Security Efficiency

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of the 11th International Conference Knowledge in Telecommunication Technologies and Optics. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2011. pp. 145-148. ISBN 978-80-248-2399-7.
  • Rok: 2011
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    One of the relatively new services presented by mobile operators is a femtocell. A femtocell is a network located at the residential premises helping to extend the mobile signal to places which are difficult to cover. Furthermore, it enables the mobile operator to provide attractive service to the customer since the femtocell is connected to the mobile operator network using an IP based backhaul link over the public Internet. To ensure appropriate security over the intrustworthy environment, an IPsec tunnel is established between the femtocell access point and the provider's security gateway located at the core network perimeter. IPsec itself wasn't originally proposed to carry small voice packets resulting in a redundant overhead. This paper examines other security procedures, such as transport layer security (TLS) and Datagram TLS (DTLS) protocols.

Optimization of DoS Resistant Broadcast Authentication Mechanism

  • Autoři: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: Proceedings of the 2011 Networking and Electronic Commerce Research Conference. Dallas, TX: American Telecommunications Systems Management Association Inc., 2011. pp. 139-143. ISBN 978-0-9820958-5-0.
  • Rok: 2011
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists. Authentication of every packet seems to be very effective way to mitigate an attack, however resulting in increase of end-to-end delay.

Perspective Security Procedures for Femtocell Backbone

  • Autoři: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2011). Piscataway: IEEE, 2011. pp. 372-375. ISSN 2157-0221. ISBN 978-1-4577-0682-0.
  • Rok: 2011
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Femtocells provide a relatively new approach, how the mobile operator can extend the cellular network, using the IP based Internet connection as the backbone link, into places where it is hard to cover the area using traditional methods. Femtocells offer also a new scope of commercial services for the customer, attractive for both the customer and the mobile operator. Currently, the security, in the untrustworthy public environment, is accomplished via IPsec tunnel between the femtocell access point and femto security gateway. This approach is not an advantage in case where an appliance using network address translation is used. Moreover, IPsec was proposed for data transport not voice packet traffic, so that can cause an involuntary data overhead, increase end-to-end delay and decrease the quality of service. In this paper we have introduced alternative femtocell IP backbone security mechanisms using other higher level security protocols (TLS, DTLS, SRTP).

Broadcast Authentication Mechanism Optimization in Fully N-ary Tree Topology

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Knowledge in Telecommunication Technologies and Optics - KTTO 2010. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 111-114. ISBN 978-80-248-2330-0.
  • Rok: 2010
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment.

Effectivity Optimization of Femtocell Backbone Security Methods

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2010 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 142-146. ISBN 978-80-248-2261-7.
  • Rok: 2010
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    The article analyses possible alternative security mechanisms for voice over IP communication in mobile network equipped with femtocells.

Inovace laboratorních cvičení předmětu Síťové technologie I

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: wRTT 2010 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 20-21. ISBN 978-80-248-2262-4.
  • Rok: 2010
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Cílem projektu je inovace a rozšíření laboratorní části cvičení předmětu X326ST1 - Síťové technologie I.

Model of DoS Resistant Broadcast Authentication Protocol in Coloured Petri Net Environment

  • Autoři: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: IWSSIP 2010 Proceedings. Rio de Janeiro: EdUFF - Editora da Universidade Federal Fluminense, 2010. pp. 264-267. ISBN 978-85-228-0565-5.
  • Rok: 2010

Optimization of Femtocell IP Backbone Security Mechanisms

  • Autoři: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of the 2010 Networking and Electronic Commerce Research Conference. Dallas, TX: American Telecommunications Systems Management Association Inc., 2010. pp. 167-176. ISBN 978-0-9820958-3-6.
  • Rok: 2010

I hlas si žádá zabezpečení

Innovation in the Course - Communication in Data Networks

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Workshop 09 CTU REPORTS. Praha: České vysoké učení technické v Praze, 2009. pp. 72-73. ISBN 978-80-01-04286-1.
  • Rok: 2009
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    For a graduate in our profession it is important to gain not only theoretical foundation through education, but also an adequate practical proficiency. The main aim of the project was to innovate educational process in course "Communication in Data networks" in practical courses as well as in theoretical level.

Inovace předmětu Informační bezpečnost a utajování zpráv

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: International Workshop wRTT 2009. Praha: České vysoké učení technické v Praze, 2009. pp. 0065_0010. ISBN 978-80-01-04411-7.
  • Rok: 2009
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Projekt "Inovace předmětu Informaní bezpečnost a utajování zpráv" se zabývá modernizaci a zefektivnění výuky stejnojmenného předmětu. Cílem projektu je inovace přednášek a doplnění a rozšíření laboratorní části cvičení. Inovace předmětu je zaměřena převážně na modernizaci stávajících a vytvoření nových praktických laboratorních úloh, tak aby lépe pokrývaly současné trendy v oblasti informační bezpečnosti. Hlavními cíli řešení je zvýšení efektivity studia formou zvýšení počtu laboratorních úloh, inovace přednášek o aktuální témata v oblasti lokálních sítí a zlepšení podmínek pro online testování znalostí studentů.

Simulation of the Selected Networks Attack to the TESLA Authentication Protocol

  • Autoři: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
  • Publikace: Digital Technologies 2009. Žilina: TU v Žilině, 2009. ISBN 978-80-554-0150-8.
  • Rok: 2009
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    This paper deals with the task of simulation the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a functional model of the protocol. Broadcast authentication protocols can be used in many situations where is one transmitter and multiple recipients such as message exchange in sensor networks routing protocols, or the process of leader election in sensors networks.

Broadcast Authentication Protocol Simulation Using Petri Nets

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    This paper deals with the task of modeling the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) as an example of broadcast authenticating protocol was used to show how Color Petri Nets can be used to create a functional model of the protocol.

Broadcast Authentication Protocol Simulation Using Petri Nets

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    This paper deals with the task of modeling the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) as an example of broadcast authenticating protocol was used to show how Color Petri Nets can be used to create a functional model of the protocol.

Course Modernization - X32IBU - Information Security and Secretion of Messages

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2008. Praha: Czech Technical University in Prague, 2008. pp. 152-153. ISBN 978-80-01-04016-4.
  • Rok: 2008

Innovation of Subject "Communication in Data Networks"

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    For a graduate in our profession it is important to gain not only theoretical foundation through education, but also an adequate practical proficiency. The main aim of the project was innovate educational process in subject " Communication in Data Networks" in practical courses as well as in theoretical lectures.

Klasifikace metod pro formální analýzu autentizačních protokolů

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Je představena klasifikace existujících dostupných metod pro vytváření formálních modelů protokolů se zaměřením na popis BAN logiky a Petriho sítí. V následujících článcích bude popsán protokol TESLA a modifikace BAN logiky k použít pro modelování všesměrových autentizačních protokolů.

Všesměrový autentizační protokol TESLA

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    V tomto článku jsou popsány základní principy všesměrového autentizačního protokolu TESLA. V dalším dílu je na tomto protokolu demonstrována možnost simulace všesměrových protokolu pomocí modifikované BAN logiky.

Course Modernization - Information Security and Secretion of Messages

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2007. Praha: České vysoké učení technické v Praze, 2007. ISBN 978-80-01-03667-9.
  • Rok: 2007

Innovation of the Course "Information Security and Secretion of Messages"

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2007. Žilina: University of Žilina, 2007. pp. 431-432. ISBN 978-80-8070-735-4.
  • Rok: 2007
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    For professionals in telco domain it is important to have at least general information about network security, basic cryptographic algorithms and protocols. The main goal of the project was to innovate who educational process in subject "Information Security and Secretions of Messages" in theoretical lectures as well as in practical courses. New lectures made students familiar with principles, architecture and applications of modern symmetric-key and asymmetric-key algorithms, hash function and widely used cryptographic protocols.

Měření v bezdrátových sítích

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Článek se zabývá popisem metody, kterou je možné použít pro měření bezdrátových sítí v reálných podmínkách. Tato metoda přehledně analyzuje všechny klíčové parametry přenosového řetězce. Díky časové souslednosti mezi testy na nižších a vyšších síťových vrstvách lze odhalit řadu skrytých problémů, které klasické testy odhalit nedokáží.

The Determination of Basic Parameters of the TIK Protocol in WiMAX

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2007. Žilina: University of Žilina, 2007. pp. 433-434. ISBN 978-80-8070-735-4.
  • Rok: 2007
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    This paper deals with the determination of basic parameters for TIK (TESLA with instant key disclosure) protocol. TESLA belongs to the family of broadcast authentication protocols. TIK is a modification of genuine TESLA protocol, which allows application in wireless environment. The most important parameter which must be determined are time for key disclosure and total number of PRF and hash operations.

Bezpečnost internetové telefonie

  • Autoři: Dočkal, J., Malina, R., Markl, J., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Data Security Management. 2006, X(6/2006), 36-42. ISSN 1211-8737.
  • Rok: 2006

CPN Usability in the Process of Modeling Authentication Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Research in Telecommunication Technology 2006 - Proceedings. Brno: Vysoké učení technické v Brně, 2006. pp. 70-71. ISBN 80-214-3243-8.
  • Rok: 2006

D-Link DGL-3400

Firewall ZyXEL ZyWALL 35UTM - Zeď, která nespadne

Formal Model of TESLA Protocol Using Modified BAN Logic

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Research in Telecommunication Technology 2006 - Proceedings. Brno: Vysoké učení technické v Brně, 2006. pp. 130-133. ISBN 80-214-3243-8.
  • Rok: 2006
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    The article describes needful modification to the original BAN logic that enables a modeling of broadcast communication protocols

S MIMO nejste "mimo" ale "in"

Security Mechanisms in SIP

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2006. Praha: České vysoké učení technické v Praze, 2006. pp. 242-243. ISBN 80-01-03439-9.
  • Rok: 2006

Asus WL-167g

Authentication Protocol Resistant to Online Dictionary Attacks

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of WORKSHOP 2005, Part A. Praha: CTU Publishing House, 2005. pp. 306-307. ISBN 80-01-03201-9.
  • Rok: 2005

BAN Logic Extensions for Formal Analysis of Authentication Protocols using PKCS

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2005 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2005. ISBN 80-248-0897-8.
  • Rok: 2005
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    The article deals with essential modifications of BAN logic to be able to formally authentciation protocols based on PKCS

Dobře osedlaný tučňák

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Komplexní bezpečnostní řešení (firewall, VPN, IDS+IPS, antivirus, antispam, traffic shaping) postavené na speciální distribuci Linuxu

Enhancements in Broadband Wireless Access Networks

Extensions to the BAN Logic for Formal Analysis of Authentication Protocols Using PKCS

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings EC-SIP-M 2005. Bratislava: STU v Bratislave, FEI, 2005. pp. 197-200. ISBN 80-227-2257-X.
  • Rok: 2005
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    The article deals with essential modifications of BAN logic to be able to formally analyse broadcast authentciation protocols

Hlídáme si lajnu: Recenze zařízení Allot NetEnforcer

Juniper Netscreen-204

Osobní strážce

Progressive Broadband Wireless Access Networks

Router x (Firewall + 4 x Switch) = Asus SL-1000

SafeEnterprise SSL iGate Pro - bezpečnost na každém kroku

Základní kámen bezpečnosti

  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Recenze tří HW firewallů (PIX-501, Juniper Nescreen 5GT a Zyxell ZyWALL 5) pro menší a střední sítě

Zkušenosti a poznatky z výstavby betonových bazénů

  • Autoři: Šťastný, B., Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Projekce,výstavba a problematika provozu bazénů a koupališť. Praha: ČVUT, Fakulta stavební, Katedra zdravotního inženýrství, 2005. pp. 39-52. ISBN 80-01-03218-3.
  • Rok: 2005

Chytrý přepínač Asus GigaX 1024P

Classification of the Attacks on Network Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2004. Praha: České vysoké učení technické v Praze, 2004. pp. 240-241. ISBN 80-01-02945-X.
  • Rok: 2004

Formal Analysis of the Cryptographic Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: COFAX-TELEKOMUNIKÁCIE 2004 - zborník prednášok. Bratislava: D&D STUDIO, 2004. pp. 323-324. ISBN 80-967019-6-7.
  • Rok: 2004

Methods of Preventing Replay Attacks on Cryptographic Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2004. Praha: ČVUT FEL, Katedra telekomunikační techniky, 2004. pp. 0713_0095. ISBN 80-01-03063-6.
  • Rok: 2004
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Reply attack is based on capturing messages (packets), potential but no necessary modification, and their later resending. This leads to mystification of identity of communicating parties. Using time stamps is one possible way how to face up these kind of attacks.

Taxonomy of Replay Attacks on Security Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2004. Praha: ČVUT FEL, Katedra telekomunikační techniky, 2004. pp. 0172_0095. ISBN 80-01-03063-6.
  • Rok: 2004
  • Pracoviště: Katedra telekomunikační techniky
  • Anotace:
    Replay attacks can be divided into several groups depending e.g. on origin of messages. The classification of replay attacks will be described in this article.

Usage of the Needham-Schroeder Protocol in the Process of Evaluation of the Security of the Authentication Protocols

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: RTT 2003 - Proceedings. Bratislava: FEI, Slovak University of Technology, 2003. pp. 238-240. ISBN 80-227-1934-X.
  • Rok: 2003

Usage of the Optimal Normal Basis in the Elliptic Curve Cryptosystems

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2003. Praha: České vysoké učení technické v Praze, 2003. pp. 284-285. ISBN 80-01-02708-2.
  • Rok: 2003

Security of the Elliptic Curve Cryptosystem

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of Workshop 2002. Praha: České vysoké učení technické v Praze, 2002. pp. 280-281. ISBN 80-01-02511-X.
  • Rok: 2002

Security of the Public-Key Cryptosystems

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: Proceedings of the International Conference Research in Telecommunication Technology. Žilina: University of Žilina, 2002. pp. 116-119. ISBN 80-7100-991-1.
  • Rok: 2002

Výhody použití Optimální normální báze v kryptosystémech na bázi eliptických křivek

  • Autoři: Ing. Tomáš Vaněk, Ph.D.,
  • Publikace: V. seminář Katedry elektroniky a telekomunikační techniky - Sborník přednesených příspěvků. Ostrava: VŠB-TUO, 2002. pp. 93-96. ISBN 80-248-0212-0.
  • Rok: 2002

Za stránku zodpovídá: Ing. Mgr. Radovan Suk