• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 30
  • 17
  • 5
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 50
  • 30
  • 28
  • 24
  • 23
  • 22
  • 22
  • 22
  • 21
  • 20
  • 18
  • 16
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Produktive und sichere Netzanwendungen

Wolf, L., Richter, F., Heik, A., Meyer, R., Ehrig, M., Heide, G., Fischer, G., Kalfa, Junghaenel, J., Parthey, M., Grunewald, D., Sontag, R., Riedel, W., Harder, F., Becher, M., Mueller, T., Ziegler, C., Anders, J., Breiler, A., Friedrich, R., Koehler, S. 13 July 1999 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze (Fakultaet Informatik) der TU Chemnitz. Globales Thema: Produktive und sichere Netzanwendungen
122

Implementace OpenVPN na platformě Windows CE / Porting OpenVPN to Windows CE Platform

Ešner, Oldřich January 2008 (has links)
The motivation for inception of this MSc. thesis which follows on from a term project of the same name was the transfer of the application for building private virtual OpenVPN networks from Windows XP operating system to Windows CE Embedded 6.0 platform. The project deals with virtual private networks in general and looks more closely at its implementation - OpenVPN. It also introduces the basic features of the Windows CE operating system. The project goes on to describe device drivers in NT-based Windows operating systems, the Windows Driver Model used, the NDIS network interface model and also the model of Windows CE drivers - the Stream Interface Model. The project continues with a~description of communication in OpenVPN application and primarily the role of TUN/TAP virtual network interfaces. This is followed by a proposal for transfer of TUN/TAP adapter drivers together with a description of limitations and necessary modifications between both platforms. As a result a TAP network device driver is implemented whose function is verified by test application that emulates the behaviour of a TUN adapter. The project concludes with an evaluation of the achieved results, the possibilities for further work on this theme and with the overall contribution of this project.
123

Bezpečné kryptografické algoritmy / Safe Cryptography Algorithms

Mahdal, Jakub January 2008 (has links)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.
124

Evaluation of different Cloud Environments and Services related to large scale organizations(Swedish Armed forces)

Ravichandran, Pravin Karthick, Balmuri, Santhosh Keerthi January 2011 (has links)
Cloud Computing (CC) is one of the fast growing computer network technologies and many companies offer their services through cloud network. Cloud Computing has many properties with respect to the existing traditional service provisions like scalability, availability, fault tolerance, capability and so on which are supported by many IT companies like Google, Amazon, Salesforce.com. These IT companies have more chances to adapt their services into a new environment, known as Cloud computing systems. There are many cloud computing services which are being provided by many IT companies.The purpose of this thesis is to investigate which cloud environment (public, private and hybrid) and services (Infrastructure as a Service, Software as a Service, and Platform as a Service) are suitable for Swedish Armed Forces (SWAF) with respect to performance, security, cost, flexibility and functionality. SWAF is using private (internal) cloud for communications where both sensitive and non-sensitive information are located in the internal cloud. There are problems like maintenance of hardware, cost issues and secure communication while maintaining the private cloud. In order to overcome those problems we have suggested a hybrid and community cloud environment and SaaS, IaaS, PaaS services for SWAF.For suggesting these cloud environments and cloud services we have performed a literature study and two empirical studies (survey and interviews) with different organizations.A new cloud model is designed based on the suggested cloud environment, separate storage spaces for sensitive and non-sensitive information, suitable services and an effective infrastructure for sharing the internal information for SWAF.
125

Mitteilungen des URZ 1/2004

Richter,, Riedel,, Grunewald,, Schier, 04 March 2004 (has links) (PDF)
Informationen des Universitätsrechenzentrums
126

Návrh bezpečnostní infrastruktury elektronického archivu / Design of security infrastructure for electronic archive

Doležel, Radek January 2009 (has links)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
127

Anonymní pohyb v síti internet / Anonymous communication on the internet

Hořejš, Jan January 2014 (has links)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
128

Mitteilungen des URZ 1/2004

Richter, Riedel, Grunewald, Schier 04 March 2004 (has links)
Informationen des Universitätsrechenzentrums:Jahresrückblick 2003 Aktuelle HBFG-Projekte Sicheres Programmieren mit PHP Passwort vergessen - was nun? VPN-Dienst des URZ Spam-Schutz 'Textanalyse' erweitert
129

Changing from the silo model to the horizontal layers model in public policy regulations: the implications and potential for the telecommunications industry

Spencer Logan, Lemuella C. 12 1900 (has links)
The end of the Twentieth Century and the start of the Twenty First Century has been a tumultuous time for the Telecommunications Industry. Even as it moves forward to embrace the new technologies the Industry finds itself embroiled in issues of governance. The Industry finds itself in a dilemma since innovations increase at a rate faster than the laws can be changed and these render its existing laws and policies to be in some cases obsolete and inappropriate for the reality of the present. In the past, the United States of America has relied on vertically integrated top down laws and methods of regulating all the different parts in its Telecommunications Industry. These laws are contained in the different numbered Titles of this Countrys Legal Codes. Since the inception of these laws, emphasis was placed in creating and documenting policies structured by industry, sector and type of content. This form of regulation is usually referred to as the Silo Method. However, in recent years, especially in the regulation of the Telephony industry, the method of law and rule formulation moved from content regulation to one in which the technologies are getting regulated in what has been described as a Layers Method. This paper first considered whether the Silo Method of regulation is in actuality the same as using the Horizontal Layers method and showed that this is the case. Then it determined that Enhanced Services are the same as Basic Services and that Telecommunications Services are the same as Information services and showed that given that the pair sets as noted were the same, it went on to conclude that all these services were essentially the same. While studying to some detail the technologies of VoIP, the paper also showed that VoIP although an Internet technology is similar to traditional telephony, and is both a Telecommunications Service and Information Service based on the definition as given in the law as well as the technologies that are used and that as a result of this, the current regulatory environment for this service with regards to telephony is inconsistent. It concluded that Telecommunications policies though now adequate may need to be modified.

Page generated in 0.0307 seconds