Persons
Ing. Tomáš Vaněk, Ph.D.
All publications
VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation
- Authors: Klemsa, J., Dr. Mgr. Lukáš Kencl, Ing. Tomáš Vaněk, Ph.D.,
- Publication: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. p. 1820-1825. ISSN 2324-9013. ISBN 978-1-5386-4387-7.
- Year: 2018
- DOI: 10.1109/TrustCom/BigDataSE.2018.00275
- Link: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00275
- Department: Department of Telecommunications Engineering
-
Annotation:
A lot of effort has been made to devise a scheme for verifiable and privacy-preserving outsourcing of arbitrary computations. However, such schemes rely on Fully Homomorphic Encryption which is still far from practical. In our work, we instead focus solely on encryption schemes with single homomorphic operation, in particular addition. We define a rigorous framework that gives the data originator a possibility to check what values have been incorporated within provided homomorphic aggregate. We also propose a practical scheme that instantiates this framework and prove that it achieves Indistinguishability under Non-Adaptive Chosen Ciphertext Attack (IND-CCA1). The definition of our framework led us further to a straightforward modification of the security notions of Non-Malleability (NM) and Adaptive Chosen Ciphertext Attack (CCA2). Our modification aims at preventing trivial breach which is by principle unavoidable for plain homomorphic encryption. With our enhancement, the notions of security can serve as a novel security goal for any future verifiable homomorphic schemes.
Distributed Architecture of 5G Mobile Networks for Efficient Computation Management in Mobile Edge Computing
- Authors: prof. Ing. Zdeněk Bečvář, Ph.D., Rohlík, M., Ing. Pavel Mach, Ph.D., Vondra, M., Ing. Tomáš Vaněk, Ph.D., Puente, M.A., Lobillo, F.
- Publication: 5G Radio Access Networks: Centralized RAN, Cloud-RAN and Virtualization of Small Cells. Boca Raton: CRC Press, 2017. p. 29-50. 1. ISBN 978-1-4987-4710-3.
- Year: 2017
- Department: Department of Telecommunications Engineering
-
Annotation:
Mobile cloud computing is a solution for offloading computation from mobile devices in order to overcome their major limitations: short battery life-time and limited computational power. However, the conventional centralized cloud with large server farms may result in a high delay of offloaded data transmission from the mobile device to the cloud and in congestion of backhaul due to offloading of high amount of data. These problems scale down the usage of common mobile cloud computing, especially for real-time services and applications. The perceived delay can be minimized by redeployment of computation resources to the edge of mobile network, for example, to the cloud-enabled base stations, as these are close to the users. To implement this new paradigm, the architecture of conventional mobile network must be enhanced with a computation management unit, which controls processing of offloaded tasks at cloud-enabled base stations. In order to reduce signaling delay and to minimize signaling load introduced by this concept, we introduce two options of new distributed deployments of the management unit. We also discuss integration of the proposed solution into 5G mobile networks based on C-RAN. By analysis and simulations of the proposed architectures, we proof that both signaling delay and signaling load could be significantly reduced comparing to centralized solutions.
In-Band Device-to-Device Communication in OFDMA Cellular Networks: A Survey and Challenges
- Authors: Ing. Pavel Mach, Ph.D., prof. Ing. Zdeněk Bečvář, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: IEEE Communications Surveys and Tutorials. 2015, 17(4), 1885-1922. ISSN 1553-877X.
- Year: 2015
- DOI: 10.1109/COMST.2015.2447036
- Link: https://doi.org/10.1109/COMST.2015.2447036
- Department: Department of Telecommunications Engineering
-
Annotation:
Direct communication between two or more devices without the intervention of a base station, known as device-to-device (D2D) communication, is a promising way to improve performance of cellular networks in terms of spectral and energy efficiency. The D2D communication paradigm has been largely exploited in non-cellular technologies such as Bluetooth or Wi-Fi but it has not yet been fully incorporated into existing cellular networks. In this regard, a new proposal focusing on the integration of D2D communication into LTE-A has been recently approved by the 3GPP standardization community as discussed in this paper. In cellular networks, D2D communication introduces several critical issues, such as interference management and decisions on whether devices should communicate directly or not. In this survey, we provide a thorough overview of the state of the art focusing on D2D communication, especially within 3GPP LTE/LTE-A. First, we provide in-depth classification of papers looking at D2D from several perspectives. Then, papers addressing all major problems and areas related to D2D are presented and approaches proposed in the papers are compared according to selected criteria. On the basis of the surveyed papers, we highlight areas not satisfactorily addressed so far and outline major challenges for future work regarding efficient integration of D2D in cellular networks.
Broadcast Security in Future Mobile Networks
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Elektronika ir Elektrotechnika. 2014, 20(10), 69-75. ISSN 1392-1215.
- Year: 2014
- DOI: 10.5755/j01.eee.20.10.6392
- Link: https://doi.org/10.5755/j01.eee.20.10.6392
- Department: Department of Telecommunications Engineering
-
Annotation:
A typical broadcast authentication communication within information distribution systems is characterised by plain text communication between nodes, which do not mutually authenticate. Although, the authentication of every incoming message seems to be a very effective way to mitigate a denial of service type attack, such process results into an increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. This paper introduces a new improved delay and resource enhanced DREAM (IDARED) scheme, which is based on the DoS resistant efficient authentication mechanism (DREAM) and which provides lower latency results achieved by several parameters optimisation and a split verification queue concept for the end-to-end management data traffic in the next generation femtocell (NGF).
Increasing Robustness of Multi-homed Systems in Heterogeneous Environment
- Authors: Rohlík, M., Chlumský, P., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Advances in Electrical and Electronic Engineering. 2014, 12(4), 265-270. ISSN 1336-1376.
- Year: 2014
- DOI: 10.15598/aeee.v12i4.1202
- Link: https://doi.org/10.15598/aeee.v12i4.1202
- Department: Department of Telecommunications Engineering
-
Annotation:
Nowadays, packet error rate in fixed networks can be considered as a negligible value. However, the increasing requirements for transmission speed of mobile devices, heterogeneous technology, and other high frequency sources cause interference growth within the electromagnetic spectrum. This affects the overall reliability and throughput of the network and may cause undesirable operation malfunction of application-level services. Higher speeds can be achieved by advanced modulation techniques, but at the price of lower resistance against the interference. On the other hand, error-correcting codes or higher-level protocols are utilized to correct the delivery failures. We introduce a novel method for increasing robustness of communication for multi-homed systems in heterogeneous environment. Furthermore, we propose a security measure to ensure confidentiality, integrity and availability of the transmitted data without influencing the transmission parameters. Finally, we show positive impact of the proposed method on transmission efficiency and effective throughput, especially in networks with high probability of error occurrence.
New Trends in Femtocell Backhaul Security
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Przeglad Elektrotechniczny. 2013, 89(2b/2013), 240-244. ISSN 0033-2097.
- Year: 2013
- Department: Department of Telecommunications Engineering
-
Annotation:
One of the relatively new services presented by mobile operators is a femtocell. A femtocell is a network located at the residential premises helping to extend the mobile signal to places which are difficult to cover. Furthermore, it enables the mobile operator to provide attractive service to the customer since the femtocell is connected to the mobile operator network using an IP based backhaul link over the public Internet. To ensure appropriate security over the untrustworthy environment, an IPsec tunnel is established between the femtocell access point and the provider’s security gateway located at the core network perimeter. IPsec itself wasn’t originally proposed to carry small voice packets resulting in a redundant overhead. This paper examines other security procedures, such as transport layer security (TLS) and Datagram TLS (DTLS) protocols.
Cloning of Access Cards Based on RFID Technology
- Authors: Holenda, M., Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: Access server. 2012, 10(7), 1-8. ISSN 1214-9675.
- Year: 2012
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with RFID access card cloning methods, describes the standards and the possible attacks on RFID system used by the Faculty of Electrical Engineering, Czech Technical University in Prague. At the end of the paper is described a device capable of emulating the anticollision loop of Standard ISO/IEC 14443A.
Alternative Protocols for Femtocell Backbone Security
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: Proceedings of WMNC 2011. Piscataway: IEEE, 2011. pp. 1-4. ISBN 978-1-4577-1191-6.
- Year: 2011
- DOI: 10.1109/WMNC.2011.6097239
- Link: https://doi.org/10.1109/WMNC.2011.6097239
- Department: Department of Telecommunications Engineering
-
Annotation:
The paper examines alternative security procedures, such as Transport Layer Security (TLS) and Datagram TLS (DTLS) protocols for securing IP based backhaul from femto access point to mobile operator.
Analysis of Broadcast Authentication Mechanism in Selected Network Topologies
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: Radioengineering. 2011, 20(1), 167-173. ISSN 1210-2512.
- Year: 2011
- Department: Department of Telecommunications Engineering
-
Annotation:
The paper deals with simulation of the broadcast authentication protocol using Colored Petri Nets and further optimization in Matlab environment.
Broadcast Authentication Mechanism Optimization
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: 13th International Conference on Research in Telecommunication Technologies 2011 - Vol. II Poster Section. Brno: VUT v Brně, Fakulta elektrotechniky a komunikačních technologií, 2011. pp. II-40-II-43. ISBN 978-80-214-4283-2.
- Year: 2011
- Department: Department of Telecommunications Engineering
-
Annotation:
Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network). Authentication of every incoming packet is effective way to mitigate an attack, however, it results in relatively increase of the end-to-end delay. To mitigate this drawback, special broadcast authentication protocols have been proposed. This paper deals with optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree topology and random tree topology.
Femtocell Backhaul Security Efficiency
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of the 11th International Conference Knowledge in Telecommunication Technologies and Optics. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2011. pp. 145-148. ISBN 978-80-248-2399-7.
- Year: 2011
- Department: Department of Telecommunications Engineering
-
Annotation:
One of the relatively new services presented by mobile operators is a femtocell. A femtocell is a network located at the residential premises helping to extend the mobile signal to places which are difficult to cover. Furthermore, it enables the mobile operator to provide attractive service to the customer since the femtocell is connected to the mobile operator network using an IP based backhaul link over the public Internet. To ensure appropriate security over the intrustworthy environment, an IPsec tunnel is established between the femtocell access point and the provider's security gateway located at the core network perimeter. IPsec itself wasn't originally proposed to carry small voice packets resulting in a redundant overhead. This paper examines other security procedures, such as transport layer security (TLS) and Datagram TLS (DTLS) protocols.
Optimization of DoS Resistant Broadcast Authentication Mechanism
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: Proceedings of the 2011 Networking and Electronic Commerce Research Conference. Dallas, TX: American Telecommunications Systems Management Association Inc., 2011. pp. 139-143. ISBN 978-0-9820958-5-0.
- Year: 2011
- Department: Department of Telecommunications Engineering
-
Annotation:
Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists. Authentication of every packet seems to be very effective way to mitigate an attack, however resulting in increase of end-to-end delay.
Perspective Security Procedures for Femtocell Backbone
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2011). Piscataway: IEEE, 2011. pp. 372-375. ISSN 2157-0221. ISBN 978-1-4577-0682-0.
- Year: 2011
- Department: Department of Telecommunications Engineering
-
Annotation:
Femtocells provide a relatively new approach, how the mobile operator can extend the cellular network, using the IP based Internet connection as the backbone link, into places where it is hard to cover the area using traditional methods. Femtocells offer also a new scope of commercial services for the customer, attractive for both the customer and the mobile operator. Currently, the security, in the untrustworthy public environment, is accomplished via IPsec tunnel between the femtocell access point and femto security gateway. This approach is not an advantage in case where an appliance using network address translation is used. Moreover, IPsec was proposed for data transport not voice packet traffic, so that can cause an involuntary data overhead, increase end-to-end delay and decrease the quality of service. In this paper we have introduced alternative femtocell IP backbone security mechanisms using other higher level security protocols (TLS, DTLS, SRTP).
Broadcast Authentication Mechanism Optimization in Fully N-ary Tree Topology
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Knowledge in Telecommunication Technologies and Optics - KTTO 2010. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 111-114. ISBN 978-80-248-2330-0.
- Year: 2010
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment.
Effectivity Optimization of Femtocell Backbone Security Methods
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2010 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 142-146. ISBN 978-80-248-2261-7.
- Year: 2010
- Department: Department of Telecommunications Engineering
-
Annotation:
The article analyses possible alternative security mechanisms for voice over IP communication in mobile network equipped with femtocells.
Model of DoS Resistant Broadcast Authentication Protocol in Coloured Petri Net Environment
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: IWSSIP 2010 Proceedings. Rio de Janeiro: EdUFF - Editora da Universidade Federal Fluminense, 2010. pp. 264-267. ISBN 978-85-228-0565-5.
- Year: 2010
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with simulation of the broadcast authentication protocols using Coloured Petri Nets (CPN).
Network Technologies I - Innovation of Laboratory Exercises
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: wRTT 2010 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2010. pp. 20-21. ISBN 978-80-248-2262-4.
- Year: 2010
- Department: Department of Telecommunications Engineering
-
Annotation:
The project is focused on innovation and expansion of laboratory excercises of the course X326ST1 - Network Technology Innovation I.
Optimization of Femtocell IP Backbone Security Mechanisms
- Authors: Rohlík, M., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of the 2010 Networking and Electronic Commerce Research Conference. Dallas, TX: American Telecommunications Systems Management Association Inc., 2010. pp. 167-176. ISBN 978-0-9820958-3-6.
- Year: 2010
- Department: Department of Telecommunications Engineering
-
Annotation:
The paper deals with optimization of the femtocell IP backbone security mechanisms.
Also Voice Needs Securing
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Connect!. 2009, XIV(5/2009), 10-13. ISSN 1211-3085.
- Year: 2009
- Department: Department of Telecommunications Engineering
-
Annotation:
The article deals with security of VoIP protocols with major focus on SIP
Innovation in the Course - Communication in Data Networks
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Workshop 09 CTU REPORTS. Praha: České vysoké učení technické v Praze, 2009. pp. 72-73. ISBN 978-80-01-04286-1.
- Year: 2009
- Department: Department of Telecommunications Engineering
-
Annotation:
For a graduate in our profession it is important to gain not only theoretical foundation through education, but also an adequate practical proficiency. The main aim of the project was to innovate educational process in course "Communication in Data networks" in practical courses as well as in theoretical level.
Innovation of the Subject "Information Security and Encryption of Messages"
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: International Workshop wRTT 2009. Praha: České vysoké učení technické v Praze, 2009. pp. 0065_0010. ISBN 978-80-01-04411-7.
- Year: 2009
- Department: Department of Telecommunications Engineering
-
Annotation:
The project deals with modernization and improving of efficiency in education. Th eobjective is to innovate the content of lectures and amendment to / extension of the laboratory exercises.
Simulation of the Selected Networks Attack to the TESLA Authentication Protocol
- Authors: Ing. Tomáš Vaněk, Ph.D., Rohlík, M.
- Publication: Digital Technologies 2009. Žilina: TU v Žilině, 2009. ISBN 978-80-554-0150-8.
- Year: 2009
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with the task of simulation the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a functional model of the protocol. Broadcast authentication protocols can be used in many situations where is one transmitter and multiple recipients such as message exchange in sensor networks routing protocols, or the process of leader election in sensors networks.
Broadcast Authentication Protocol Simulation Using Petri Nets
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2008. Bratislava: STU v Bratislave, 2008. ISBN 978-80-227-2939-0.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with the task of modeling the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) as an example of broadcast authenticating protocol was used to show how Color Petri Nets can be used to create a functional model of the protocol.
Broadcast Authentication Protocol Simulation Using Petri Nets
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2008. Bratislava: STU v Bratislave, 2008. ISBN 978-80-227-2939-0.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with the task of modeling the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) as an example of broadcast authenticating protocol was used to show how Color Petri Nets can be used to create a functional model of the protocol.
Classification of the methods for the formal analysis of authnetication protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Access server. 2008, 6.(2008120012), 1-5. ISSN 1214-9675.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
This article deals with classification of existing methods for formal analysis of the authentication protocols with focus on broadcast authentication protocols. The greatest attention is paid to the BAN logic and Coloured Petri Nets.
Course Modernization - X32IBU - Information Security and Secretion of Messages
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2008. Praha: Czech Technical University in Prague, 2008. pp. 152-153. ISBN 978-80-01-04016-4.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
The article describes inovation of the course Information Security and Secretion of Messages.
Innovation of Subject "Communication in Data Networks"
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2008. Bratislava: STU v Bratislave, 2008. ISBN 978-80-227-2939-0.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
For a graduate in our profession it is important to gain not only theoretical foundation through education, but also an adequate practical proficiency. The main aim of the project was innovate educational process in subject " Communication in Data Networks" in practical courses as well as in theoretical lectures.
TESLA - A Broadcast Authentication Protocol
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Access server. 2008, 6.(2008120013), 1-6. ISSN 1214-9675.
- Year: 2008
- Department: Department of Telecommunications Engineering
-
Annotation:
This article describes basic properties and behaviour of the broadcast authentication protocol TESLA. This protocol can be used for one-way authentication of the messages that are sent to the multiple receivers simultaneously.
Course Modernization - Information Security and Secretion of Messages
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2007. Praha: České vysoké učení technické v Praze, 2007. ISBN 978-80-01-03667-9.
- Year: 2007
- Department: Department of Telecommunications Engineering
-
Annotation:
The article describes innovation of the course Information Security and Secretion of Messages.
Innovation of the Course "Information Security and Secretion of Messages"
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2007. Žilina: University of Žilina, 2007. pp. 431-432. ISBN 978-80-8070-735-4.
- Year: 2007
- Department: Department of Telecommunications Engineering
-
Annotation:
For professionals in telco domain it is important to have at least general information about network security, basic cryptographic algorithms and protocols. The main goal of the project was to innovate who educational process in subject "Information Security and Secretions of Messages" in theoretical lectures as well as in practical courses. New lectures made students familiar with principles, architecture and applications of modern symmetric-key and asymmetric-key algorithms, hash function and widely used cryptographic protocols.
Measurements in Wireless Networks
- Authors: Ing. Zbyněk Kocur, Ph.D., Šafránek, M., Ing. Pavel Bezpalec, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: VII. seminář katedry telekomunikační techniky. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2007. pp. B05. ISBN 978-80-248-1370-7.
- Year: 2007
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with the concept of the method how to measure wireless network in a real world. All key parameters of the telecommunication system are digestedly analyzed with this specific method. A lot of hidden problems, which remain unrecognized by the classic tests, are finally resolved by the time-sequence testing on each network layer.
The Determination of Basic Parameters of the TIK Protocol in WiMAX
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2007. Žilina: University of Žilina, 2007. pp. 433-434. ISBN 978-80-8070-735-4.
- Year: 2007
- Department: Department of Telecommunications Engineering
-
Annotation:
This paper deals with the determination of basic parameters for TIK (TESLA with instant key disclosure) protocol. TESLA belongs to the family of broadcast authentication protocols. TIK is a modification of genuine TESLA protocol, which allows application in wireless environment. The most important parameter which must be determined are time for key disclosure and total number of PRF and hash operations.
CPN Usability in the Process of Modeling Authentication Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Research in Telecommunication Technology 2006 - Proceedings. Brno: Vysoké učení technické v Brně, 2006. pp. 70-71. ISBN 80-214-3243-8.
- Year: 2006
- Department: Department of Telecommunications Engineering
-
Annotation:
The article describes CPN as simulation environment for modeling authentication protocols
D-Link DGL-3400
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2006, VII(1/2006), 40-41. ISSN 1214-5335.
- Year: 2006
- Department: Department of Telecommunications Engineering
Firewall ZyXEL ZyWALL 35UTM - The Wall That Will Not Fall
- Authors: Ing. Pavel Bezpalec, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Connect!. 2006, XI(2/2006), 38-40. ISSN 1211-3085.
- Year: 2006
- Department: Department of Telecommunications Engineering
Formal Model of TESLA Protocol Using Modified BAN Logic
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Research in Telecommunication Technology 2006 - Proceedings. Brno: Vysoké učení technické v Brně, 2006. pp. 130-133. ISBN 80-214-3243-8.
- Year: 2006
- Department: Department of Telecommunications Engineering
-
Annotation:
The article describes needful modification to the original BAN logic that enables a modeling of broadcast communication protocols
Internet Telephony Security
- Authors: Dočkal, J., Malina, R., Markl, J., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Data Security Management. 2006, X(6/2006), 36-42. ISSN 1211-8737.
- Year: 2006
- Department: Department of Telecommunications Engineering
-
Annotation:
The article deals with security of VoIP protocols with major focus on SIP
Security Mechanisms in SIP
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2006. Praha: České vysoké učení technické v Praze, 2006. pp. 242-243. ISBN 80-01-03439-9.
- Year: 2006
- Department: Department of Telecommunications Engineering
-
Annotation:
The article describes basic security mechanisms defined in SIP
With MIMO You Are Not "Out" But "In"
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2006, VII(10/2006), 44-46. ISSN 1214-5335.
- Year: 2006
- Department: Department of Telecommunications Engineering
Asus WL-167g
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2005, VI(03/2005), 42-43. ISSN 1214-5335.
- Year: 2005
- Department: Department of Telecommunications Engineering
Authentication Protocol Resistant to Online Dictionary Attacks
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of WORKSHOP 2005, Part A. Praha: CTU Publishing House, 2005. pp. 306-307. ISBN 80-01-03201-9.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
The article deals with selected methods of securing authentication protocols to online dictionary attacks.
BAN Logic Extensions for Formal Analysis of Authentication Protocols using PKCS
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2005 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2005. ISBN 80-248-0897-8.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
The article deals with essential modifications of BAN logic to be able to formally authentciation protocols based on PKCS
Enhancements in Broadband Wireless Access Networks
- Authors: Šafránek, M., Ing. Robert Bešťák, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Electronics and Telecommunications - Papers. Riga: Riga Technical University, 2005. p. 2-5.
- Year: 2005
- Department: Department of Telecommunications Engineering
Experiences and Technological Knowledges in Concrete Swimming Pools
- Authors: Šťastný, B., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Projekce,výstavba a problematika provozu bazénů a koupališť. Praha: ČVUT, Fakulta stavební, Katedra zdravotního inženýrství, 2005. pp. 39-52. ISBN 80-01-03218-3.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
Article deals with a experiencesin with a conrete swimming pools in Czech Republic
Extensions to the BAN Logic for Formal Analysis of Authentication Protocols Using PKCS
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings EC-SIP-M 2005. Bratislava: STU v Bratislave, FEI, 2005. pp. 197-200. ISBN 80-227-2257-X.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
The article deals with essential modifications of BAN logic to be able to formally analyse broadcast authentciation protocols
Juniper Netscreen-204
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2005, VI.(06/2005), 51-52. ISSN 1214-5335.
- Year: 2005
- Department: Department of Telecommunications Engineering
Keeping the Line: Review of Allot NetEnforcer
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Connect!. 2005, X.(05/2005), 27-29. ISSN 1211-3085.
- Year: 2005
- Department: Department of Telecommunications Engineering
Progressive Broadband Wireless Access Networks
- Authors: Šafránek, M., Ing. Robert Bešťák, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2005 Proceedings. Ostrava: VŠB - TUO, FEI, Katedra elektroniky a telekomunikační techniky, 2005. ISBN 80-248-0897-8.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
Basic features and key mechanisms used by IEEE 802.16
Router x (Firewall + 4 x Switch) = Asus SL-1000
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2005, VI.(05/2005), 57-58. ISSN 1214-5335.
- Year: 2005
- Department: Department of Telecommunications Engineering
SafeEnterprise SSL iGate Pro - Safety at Every Turn
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2005, VI(01/2005), 25-27. ISSN 1214-5335.
- Year: 2005
- Department: Department of Telecommunications Engineering
-
Annotation:
SafeEnterpriseSSL iGate is a security appliance enabling secure remote access to applications, web pages or data which are located in protected network. Authentication of remote users can be done not only byname/password combination, but there is a possibility to use a USB token iKey. This significantly increases security of whole solution.
Security Cornerstone
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Connect!. 2005, X.(06/2005), 22-27. ISSN 1211-3085.
- Year: 2005
- Department: Department of Telecommunications Engineering
The Bodyguard
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Connect!. 2005, X.(07/2005), 36-37. ISSN 1211-3085.
- Year: 2005
- Department: Department of Telecommunications Engineering
Well-Saddled Penguin
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2005, VI.(10/2005), 62-63. ISSN 1214-5335.
- Year: 2005
- Department: Department of Telecommunications Engineering
Classification of the Attacks on Network Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2004. Praha: České vysoké učení technické v Praze, 2004. pp. 240-241. ISBN 80-01-02945-X.
- Year: 2004
- Department: Department of Telecommunications Engineering
Formal Analysis of the Cryptographic Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: COFAX-TELEKOMUNIKÁCIE 2004 - zborník prednášok. Bratislava: D&D STUDIO, 2004. pp. 323-324. ISBN 80-967019-6-7.
- Year: 2004
- Department: Department of Telecommunications Engineering
Methods of Preventing Replay Attacks on Cryptographic Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2004. Praha: ČVUT FEL, Katedra telekomunikační techniky, 2004. pp. 0713_0095. ISBN 80-01-03063-6.
- Year: 2004
- Department: Department of Telecommunications Engineering
-
Annotation:
Reply attack is based on capturing messages (packets), potential but no necessary modification, and their later resending. This leads to mystification of identity of communicating parties. Using time stamps is one possible way how to face up these kind of attacks.
Smart Switch Asus GigaX 1024P
- Authors: Ing. Pavel Bezpalec, Ph.D., Ing. Tomáš Vaněk, Ph.D.,
- Publication: Professional Computing. 2004, V(12/2004), 48-50. ISSN 1214-5335.
- Year: 2004
- Department: Department of Telecommunications Engineering
-
Annotation:
Description of the device
Taxonomy of Replay Attacks on Security Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2004. Praha: ČVUT FEL, Katedra telekomunikační techniky, 2004. pp. 0172_0095. ISBN 80-01-03063-6.
- Year: 2004
- Department: Department of Telecommunications Engineering
-
Annotation:
Replay attacks can be divided into several groups depending e.g. on origin of messages. The classification of replay attacks will be described in this article.
Usage of the Needham-Schroeder Protocol in the Process of Evaluation of the Security of the Authentication Protocols
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: RTT 2003 - Proceedings. Bratislava: FEI, Slovak University of Technology, 2003. pp. 238-240. ISBN 80-227-1934-X.
- Year: 2003
- Department: Department of Telecommunications Engineering
Usage of the Optimal Normal Basis in the Elliptic Curve Cryptosystems
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2003. Praha: České vysoké učení technické v Praze, 2003. pp. 284-285. ISBN 80-01-02708-2.
- Year: 2003
- Department: Department of Telecommunications Engineering
Advantages of Using Optimum Normal Base in Cryptosystems Based on Elliptic Curves
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: V. seminář Katedry elektroniky a telekomunikační techniky - Sborník přednesených příspěvků. Ostrava: VŠB-TUO, 2002. pp. 93-96. ISBN 80-248-0212-0.
- Year: 2002
- Department: Department of Telecommunications Engineering
Security of the Elliptic Curve Cryptosystem
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of Workshop 2002. Praha: České vysoké učení technické v Praze, 2002. pp. 280-281. ISBN 80-01-02511-X.
- Year: 2002
- Department: Department of Telecommunications Engineering
Security of the Public-Key Cryptosystems
- Authors: Ing. Tomáš Vaněk, Ph.D.,
- Publication: Proceedings of the International Conference Research in Telecommunication Technology. Žilina: University of Žilina, 2002. pp. 116-119. ISBN 80-7100-991-1.
- Year: 2002
- Department: Department of Telecommunications Engineering