Kontaktujte nás | Jazyk: čeština English
dc.title | Advanced user authentication process based on the principles of fractal geometry | en |
dc.contributor.author | Motýl, Ivo | |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | Recent Advances in Signal Processing, Computational Geometry and Systems Theory - ISCGAV'11, ISTASC'11 | |
dc.identifier.isbn | 978-1-61804-027-5 | |
dc.date.issued | 2011 | |
dc.citation.spage | 109 | |
dc.citation.epage | 112 | |
dc.event.title | 11th WSEAS International Conference on Signal Processing, Computational Geometry and Artificial Vision, ISCGAV'11, 11th WSEAS International Conference on Systems Theory and Scientific Computation, ISTASC'11 | |
dc.event.location | Florence | |
utb.event.state-en | Italy | |
utb.event.state-cs | Itálie | |
dc.event.sdate | 2011-08-23 | |
dc.event.edate | 2011-08-25 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.relation.uri | http://www.wseas.us/e-library/conferences/2011/Florence/GAVTASC/GAVTASC-17.pdf | |
dc.subject | Authentication | en |
dc.subject | Fractal geometry | en |
dc.subject | Fractal set | en |
dc.subject | HASH | en |
dc.subject | Hash function | en |
dc.subject | Information security | en |
dc.subject | Information system | en |
dc.subject | Protection | en |
dc.subject | Security | en |
dc.description.abstract | This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1005157 | |
utb.identifier.rivid | RIV/70883521:28140/11:43865789!RIV12-MSM-28140___ | |
utb.identifier.obdid | 43865805 | |
utb.identifier.scopus | 2-s2.0-82655171962 | |
utb.source | d-scopus | |
dc.date.accessioned | 2015-06-29T11:54:14Z | |
dc.date.available | 2015-06-29T11:54:14Z | |
utb.contributor.internalauthor | Motýl, Ivo | |
utb.contributor.internalauthor | Jašek, Roman | |
utb.fulltext.affiliation | IVO MOTÝL, ROMAN JAŠEK Department of Informatics and Artificial Intelligence Thomas Bata University Faculty of Applied Informatics nám. T.G.Masaryka 5555 Czech Republic motyl@fai.utb.cz, jasek@fai.utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Piller, I., Hashovací funkce a jejich využití při autentizaci, Vysoké učení technické v Brně, 2009 [2] Tříska, D., Kryptografická ochrana, Univerzita Tomáše Bati ve Zlíně, 2009. [3] Oracle ThinQuest, available from: <http://library.thinkquest.org/07aug/01676/relevance_cryptographictechnologies_authentication_hashcodes.html>. [4] Zelinka, I. Fraktální geometrie – principy a aplikace, BEN Praha 2006. [5] The Mandelbrot set, available from: <http://warp.povusers.org/Mandelbrot/> [6] Lofstedt, T. Fractal Geometry, Graph and Tree Constructions, Umea University, Sweden 2008. | |
utb.fulltext.sponsorship | This article was supported by the European Regional Development Fund under the Project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089 and Internal grant agency (IGA/29/FAI/11/D). |