Return to search

Tunelovací a kryptografické protokoly jako ochrana soukromí na regulovaném internetu / Tunneling and Cryptographic protocols as a privacy protection on regulated internet

This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured using Wireshark network protocol analyzer and also the analysis of potential risks has been done for the event that the communication would be captured by a third party - the regulator.

Identiferoai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:218840
Date January 2011
CreatorsČížek, Michal
ContributorsPust, Radim, Burda, Karel
PublisherVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
Source SetsCzech ETDs
LanguageCzech
Detected LanguageEnglish
Typeinfo:eu-repo/semantics/masterThesis
Rightsinfo:eu-repo/semantics/restrictedAccess

Page generated in 0.0018 seconds