Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Server authentication). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Brno University of Technology

1. Šebesta, David. Autentizační protokoly na omezených zařízení .

Degree: 2014, Brno University of Technology

 Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH,… (more)

Subjects/Keywords: mikrokontrolér; omezená zařízení; hash; autentizace; autentizace klient–server; autentizační protokol; microcontroller; restricted devices; hash; authentication; authentication client–server; authentication protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šebesta, D. (2014). Autentizační protokoly na omezených zařízení . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/34231

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šebesta, David. “Autentizační protokoly na omezených zařízení .” 2014. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/34231.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šebesta, David. “Autentizační protokoly na omezených zařízení .” 2014. Web. 17 Jul 2019.

Vancouver:

Šebesta D. Autentizační protokoly na omezených zařízení . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/34231.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šebesta D. Autentizační protokoly na omezených zařízení . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/34231

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Otago

2. Keshariya, Astha. Authenticated Trusted Server Controlled Key Establishment .

Degree: 2011, University of Otago

 The trusted server based key establishment protocols are well received by the research community. In this thesis we have discussed the benefits of asymmetric key… (more)

Subjects/Keywords: Authentication; Key Establishment protocol; Trusted Server; 3-D Secure; Third party

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Keshariya, A. (2011). Authenticated Trusted Server Controlled Key Establishment . (Doctoral Dissertation). University of Otago. Retrieved from http://hdl.handle.net/10523/557

Chicago Manual of Style (16th Edition):

Keshariya, Astha. “Authenticated Trusted Server Controlled Key Establishment .” 2011. Doctoral Dissertation, University of Otago. Accessed July 17, 2019. http://hdl.handle.net/10523/557.

MLA Handbook (7th Edition):

Keshariya, Astha. “Authenticated Trusted Server Controlled Key Establishment .” 2011. Web. 17 Jul 2019.

Vancouver:

Keshariya A. Authenticated Trusted Server Controlled Key Establishment . [Internet] [Doctoral dissertation]. University of Otago; 2011. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10523/557.

Council of Science Editors:

Keshariya A. Authenticated Trusted Server Controlled Key Establishment . [Doctoral Dissertation]. University of Otago; 2011. Available from: http://hdl.handle.net/10523/557

3. Elenilson Vieira da Silva Filho. Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real.

Degree: 2013, Universidade Federal da Paraíba

A necessidade de compartilhar os dados presentes cada vez mais nos sistemas de informação leva ao desenvolvimento de soluções mais complexas e criativas para os… (more)

Subjects/Keywords: Informática; Criptografia; Refletor multimídia; CIENCIA DA COMPUTACAO; Security; Multiple Unicast Media Flow; Cryptography; AES; Federated Authentication; Authentication Central Server; Multimedia Reflector

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Filho, E. V. d. S. (2013). Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real. (Thesis). Universidade Federal da Paraíba. Retrieved from http://bdtd.biblioteca.ufpb.br/tde_busca/arquivo.php?codArquivo=2861

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Filho, Elenilson Vieira da Silva. “Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real.” 2013. Thesis, Universidade Federal da Paraíba. Accessed July 17, 2019. http://bdtd.biblioteca.ufpb.br/tde_busca/arquivo.php?codArquivo=2861.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Filho, Elenilson Vieira da Silva. “Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real.” 2013. Web. 17 Jul 2019.

Vancouver:

Filho EVdS. Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real. [Internet] [Thesis]. Universidade Federal da Paraíba; 2013. [cited 2019 Jul 17]. Available from: http://bdtd.biblioteca.ufpb.br/tde_busca/arquivo.php?codArquivo=2861.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Filho EVdS. Uma Estratégia de Refletores Multimídia para Criptografia e Codificação em Tempo Real. [Thesis]. Universidade Federal da Paraíba; 2013. Available from: http://bdtd.biblioteca.ufpb.br/tde_busca/arquivo.php?codArquivo=2861

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

4. Humpolík, Jan. Webová aplikace využívající vícefaktorovou autentizaci .

Degree: 2013, Brno University of Technology

 V práci je popsáno a implementováno 5 autentizačních metod (některé s vlastním návrhem) vícefaktorové autentizace v prostředí webových aplikací. Z výsledků práce lze využít jak… (more)

Subjects/Keywords: Android; autentizace; certifikát; čipová karta; Google Authenticator; MyWebID; OTP; SMS autentizace; vícefaktorová autentizace; webový server; YubiKey; Android; authentication; Google Authenticator; multi-factor authentication; MyWebID; OTP; smart card; SMS authentication; USB token; web server; YubiKey

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humpolík, J. (2013). Webová aplikace využívající vícefaktorovou autentizaci . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/20728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humpolík, Jan. “Webová aplikace využívající vícefaktorovou autentizaci .” 2013. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/20728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humpolík, Jan. “Webová aplikace využívající vícefaktorovou autentizaci .” 2013. Web. 17 Jul 2019.

Vancouver:

Humpolík J. Webová aplikace využívající vícefaktorovou autentizaci . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/20728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humpolík J. Webová aplikace využívající vícefaktorovou autentizaci . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/20728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

5. Sandberg, Joakim. Network Authentication to the Physical World.

Degree: CoS, 2018, KTH

Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR… (more)

Subjects/Keywords: Authentication; Authorization; Accounting; Security applications; QR-code; door station; Validation Server; Authentication; Authorization; Accounting; Säkerhetsapplikationer; QR-kod; IoT; Door Station; Valideringsserver; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandberg, J. (2018). Network Authentication to the Physical World. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sandberg, Joakim. “Network Authentication to the Physical World.” 2018. Thesis, KTH. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sandberg, Joakim. “Network Authentication to the Physical World.” 2018. Web. 17 Jul 2019.

Vancouver:

Sandberg J. Network Authentication to the Physical World. [Internet] [Thesis]. KTH; 2018. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sandberg J. Network Authentication to the Physical World. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Choi, Taehwan. Weak and strong authentication in computer networks.

Degree: Computer Sciences, 2012, University of Texas – Austin

 In this dissertation, we design and analyze five authentication protocols that answer to the a firmative the following fi ve questions associated with the authentication(more)

Subjects/Keywords: Authentication; Authentication protocols; Server authentication; Client authentication; Integrity; HTTP; HTTPS; Password protocol; TLS; Anonymous authentication; Sensor networks; Keying protocol

…HTTPI provides server authentication guarantees that are similar to those provided by HTTPS… …security guarantees of server authentication, message integrity, and message confidentiality. The… …applications.” For example, news, social networking, and blogging require server authentication… …as server authentication and message integrity, HTTPS is overkill for “open application… …key. HTTPI provides five security guarantees: 1) Authentication of server S, 2)… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, T. (2012). Weak and strong authentication in computer networks. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/19532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Choi, Taehwan. “Weak and strong authentication in computer networks.” 2012. Thesis, University of Texas – Austin. Accessed July 17, 2019. http://hdl.handle.net/2152/19532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Choi, Taehwan. “Weak and strong authentication in computer networks.” 2012. Web. 17 Jul 2019.

Vancouver:

Choi T. Weak and strong authentication in computer networks. [Internet] [Thesis]. University of Texas – Austin; 2012. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2152/19532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Choi T. Weak and strong authentication in computer networks. [Thesis]. University of Texas – Austin; 2012. Available from: http://hdl.handle.net/2152/19532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Loviška, Martin. Autentizace pomocí tokenu .

Degree: 2016, Brno University of Technology

 Práca sa zaoberá možnosťami autentizácie pomocou bezpečnostného tokena do konzole linuxu a webovej aplikácie. Teoretická časť sa venuje základom kryptografie, najmä algo- ritmami asymetrickej kryptografie.… (more)

Subjects/Keywords: RSA; eliptické krivky; USB token; PKCS#11; smart card; SmartCard-HSM; Linux; au- tentizácia; kryptografia; webový server; SSH; SSL; RSA; ECC; USB token; PKCS#11; smart card; SmartCard-HSM; Linux; authentication; cryptography; web server; SSH; SSL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loviška, M. (2016). Autentizace pomocí tokenu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/60447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Loviška, Martin. “Autentizace pomocí tokenu .” 2016. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/60447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Loviška, Martin. “Autentizace pomocí tokenu .” 2016. Web. 17 Jul 2019.

Vancouver:

Loviška M. Autentizace pomocí tokenu . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/60447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Loviška M. Autentizace pomocí tokenu . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/60447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

8. Kunčar, Jiří. Webový proxy server .

Degree: 2010, Brno University of Technology

 Práce čtenáře seznámí s internetem a jeho historií, tvorbou webových stránek, principem proxy serverů a se souvisejícími protokoly TPC/IP a HTTP. Hlavním cílem této práce… (more)

Subjects/Keywords: Internet; WWW; webové stránky; TCP/IP; HTTP; proxy server; HTML; optimalizace; grafické formáty; komprimace; gzip; base64; Adblock Plus; ImageMagick; autentizace; Internet; WWW; Web pages; TCP/IP; HTTP; proxy server; HTML; optimization; graphic formats; compression; gzip; base64; Adblock Plus; ImageMagick; authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kunčar, J. (2010). Webový proxy server . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/56065

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kunčar, Jiří. “Webový proxy server .” 2010. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/56065.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kunčar, Jiří. “Webový proxy server .” 2010. Web. 17 Jul 2019.

Vancouver:

Kunčar J. Webový proxy server . [Internet] [Thesis]. Brno University of Technology; 2010. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/56065.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kunčar J. Webový proxy server . [Thesis]. Brno University of Technology; 2010. Available from: http://hdl.handle.net/11012/56065

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Hanzlíček, Martin. Bezpečnost IoT .

Degree: 2016, Brno University of Technology

 Práca sa zaoberá problematikou zabezpečenia platformy Android Wear. Rieši časovú náročnosť výpočtov s veľkými číslami, modulárnou aritmetikou a kryptografiou na tejto platforme. Ďalej rieši komunikáciu… (more)

Subjects/Keywords: Internet vecí; Android Wear; časová náročnosť; modulárna aritmetika; kryptografia; Bluetooth komunikácia; protokol klient-server; protokoly s nulovou znalosťou; autentizačný protokol; Internet of Things; Android Wear; time consumption; modular arithmetic; cryptography; Bluetooth communication; protocol client-server; Zero-knowledge protocols; authentication protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hanzlíček, M. (2016). Bezpečnost IoT . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hanzlíček, Martin. “Bezpečnost IoT .” 2016. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/61585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hanzlíček, Martin. “Bezpečnost IoT .” 2016. Web. 17 Jul 2019.

Vancouver:

Hanzlíček M. Bezpečnost IoT . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/61585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hanzlíček M. Bezpečnost IoT . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/61585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

10. Yu, Ping. Direct Online/Offline Digital Signature Schemes.

Degree: 2008, University of North Texas

 Online/offline signature schemes are useful in many situations, and two such scenarios are considered in this dissertation: bursty server authentication and embedded device authentication. In… (more)

Subjects/Keywords: bursty server authentication; standard model; Online/offline digital signature schemes; embedded dvice authentication; Digital signatures.; Computer networks  – Access control.; Computer networks  – Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, P. (2008). Direct Online/Offline Digital Signature Schemes. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc9717/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Ping. “Direct Online/Offline Digital Signature Schemes.” 2008. Thesis, University of North Texas. Accessed July 17, 2019. https://digital.library.unt.edu/ark:/67531/metadc9717/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Ping. “Direct Online/Offline Digital Signature Schemes.” 2008. Web. 17 Jul 2019.

Vancouver:

Yu P. Direct Online/Offline Digital Signature Schemes. [Internet] [Thesis]. University of North Texas; 2008. [cited 2019 Jul 17]. Available from: https://digital.library.unt.edu/ark:/67531/metadc9717/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu P. Direct Online/Offline Digital Signature Schemes. [Thesis]. University of North Texas; 2008. Available from: https://digital.library.unt.edu/ark:/67531/metadc9717/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Chatzaras, Anargyros. Seamless speaker recognition.

Degree: Radio Systems Laboratory (RS Lab), 2015, KTH

In a technologically advanced society, the average person manages dozens of accounts for e-mail, social networks, e-banking, and other electronic services. As the number… (more)

Subjects/Keywords: speaker recognition; user authentication; seamless operation; biometrics; standalone; client-server; Android; talarigenkänning; användarautentisering; sömlös drift; biometri; fristående; klient-server; Android

authentication and authorization . . . . . . . . . 2.3 Speech recognition and speaker recognition… …Seamless speaker recognition architectures . 4.2.1 Client-server architecture . . . . . . 4.2.2… …application flow . . . . . . . . . . . . . . . . . . . . . . . . 24 Client-server communication… …speakers [3]. 1.2 Problem definition Most of today’s user authentication systems… …generalise the results to the entire population. 2.2 Identification, authentication and… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chatzaras, A. (2015). Seamless speaker recognition. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-159021

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chatzaras, Anargyros. “Seamless speaker recognition.” 2015. Thesis, KTH. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-159021.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chatzaras, Anargyros. “Seamless speaker recognition.” 2015. Web. 17 Jul 2019.

Vancouver:

Chatzaras A. Seamless speaker recognition. [Internet] [Thesis]. KTH; 2015. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-159021.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chatzaras A. Seamless speaker recognition. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-159021

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Čepelák, Tomáš. Portál univerzálního protokolu řízení přístupu .

Degree: 2014, Brno University of Technology

 Práce se zaměřuje na problematiku řízení přístupu. Představuje univerzální dvoustranný protokol řízení přístupu ACP. Vpráci jsou popsány zprávy tohoto protokolu a jejich sekvence, které AC… (more)

Subjects/Keywords: Řízení přístupu; systémy AAA; AAA server; autentifikace; autorizace; účtování; protokol ACP; ACP-VSA; Transakce; AC portál; univerzální protokol řízení přístupu; Microsoft .NET Framework; C#; Control Access; AAA Systems; AAA Server; Authentication; Authorization; Acounting; ACP Protocol; ACP-VSA; Transaction; AC Portal; Universal Access Control Protocol; Microsoft .NET Framework; C#

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Čepelák, T. (2014). Portál univerzálního protokolu řízení přístupu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/32966

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Čepelák, Tomáš. “Portál univerzálního protokolu řízení přístupu .” 2014. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/32966.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Čepelák, Tomáš. “Portál univerzálního protokolu řízení přístupu .” 2014. Web. 17 Jul 2019.

Vancouver:

Čepelák T. Portál univerzálního protokolu řízení přístupu . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/32966.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Čepelák T. Portál univerzálního protokolu řízení přístupu . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/32966

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

13. Jensen, Jonas. Säkerhetsutvärdering certifikatserver i stället för aktiva kort.

Degree: Electrical Engineering, 2005, Linköping University

  Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for… (more)

Subjects/Keywords: Informationsteknik; Authentication; securityserver; certificate server; reverse turing test; cryptographic; smartcard; Informationsteknik; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jensen, J. (2005). Säkerhetsutvärdering certifikatserver i stället för aktiva kort. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jensen, Jonas. “Säkerhetsutvärdering certifikatserver i stället för aktiva kort.” 2005. Thesis, Linköping University. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jensen, Jonas. “Säkerhetsutvärdering certifikatserver i stället för aktiva kort.” 2005. Web. 17 Jul 2019.

Vancouver:

Jensen J. Säkerhetsutvärdering certifikatserver i stället för aktiva kort. [Internet] [Thesis]. Linköping University; 2005. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jensen J. Säkerhetsutvärdering certifikatserver i stället för aktiva kort. [Thesis]. Linköping University; 2005. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Jönköping University

14. Forsman, Gustaf. Implementering av 802.1x i trådbundna datanätverk.

Degree: Computer and Electrical Engineering, 2008, Jönköping University

I dagsläget ligger oftast fokus för datasäkerhet hos de flesta företag och organisationer på att skydda gränsen mellan det egna interna datanätverket och det… (more)

Subjects/Keywords: 802.1x; EAP; EAPOL; RADIUS; Supplicant; Authenticator; Authentication Server; FreeRADIUS; Novell eDirectory; Cisco Systems; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Forsman, G. (2008). Implementering av 802.1x i trådbundna datanätverk. (Thesis). Jönköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Forsman, Gustaf. “Implementering av 802.1x i trådbundna datanätverk.” 2008. Thesis, Jönköping University. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Forsman, Gustaf. “Implementering av 802.1x i trådbundna datanätverk.” 2008. Web. 17 Jul 2019.

Vancouver:

Forsman G. Implementering av 802.1x i trådbundna datanätverk. [Internet] [Thesis]. Jönköping University; 2008. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Forsman G. Implementering av 802.1x i trådbundna datanätverk. [Thesis]. Jönköping University; 2008. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. HASSAN, FARRUKH. ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION.

Degree: Information Technology, 2015, Uppsala University

  This thesis communicates a new approach for the future Library system using secure NFC technology. Today we can use NFC and Android based mobile… (more)

Subjects/Keywords: Cloud based Server; Attacks; Heterogeneous Networks; Authentication; RFID tags; NFC; Partial keys.

…x22;" " 3.4 Authentication enhancement in Library by use of NFC 2" &$,"… …7"" " 3.5 Authentication enhancement in Library by use of NFC G" G/0… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

HASSAN, F. (2015). ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

HASSAN, FARRUKH. “ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION.” 2015. Thesis, Uppsala University. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

HASSAN, FARRUKH. “ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION.” 2015. Web. 17 Jul 2019.

Vancouver:

HASSAN F. ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION. [Internet] [Thesis]. Uppsala University; 2015. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

HASSAN F. ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION. [Thesis]. Uppsala University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

16. Halfar, Patrik. Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP .

Degree: 2008, Brno University of Technology

 Tato práce se zabývá problematikou výměny informací v počítačových sítích. V první části se zabývá úvodem do diskuzních skupin, známých též pod názvem NetNews a… (more)

Subjects/Keywords: DNS; Instant messaging; NetNews; Mailing list; USENET; transport; klient; server; transport; služba; autentizace; autorizace; konečný automat; DNS; Instant messaging; NetNews; Mailing list; USENET; transport; client; server; transport; service; authentication; authorization; finite state machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Halfar, P. (2008). Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Halfar, Patrik. “Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP .” 2008. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/55402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Halfar, Patrik. “Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP .” 2008. Web. 17 Jul 2019.

Vancouver:

Halfar P. Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP . [Internet] [Thesis]. Brno University of Technology; 2008. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/55402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Halfar P. Jabber/XMPP transport pro diskuzní skupiny přístupné protokolem NNTP . [Thesis]. Brno University of Technology; 2008. Available from: http://hdl.handle.net/11012/55402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Papež, Zdeněk. Databáze specifikací bezpečnostních protokolů .

Degree: 2008, Brno University of Technology

 Tato bakalářská práce pojednává o bezpečnostních protokolech, které slouží jako prostředek pro vytvoření chráněné komunikace ve veřejné síti, Internetu. Bezpečnostních protokolů je celá řada. Proto… (more)

Subjects/Keywords: Bezpečnostní protokoly; specifikace; množina znalostí; množina předpokladů; útok; symetrické šifrování; asymetrické šifrování; důvěryhodný server; autentizace; distribuce klíče.; Security protocols; specification; knowledge base; prediction base; attack; symmetric encryption; asymmetric encryption; trusted server; authentication; key distribution.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papež, Z. (2008). Databáze specifikací bezpečnostních protokolů . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Papež, Zdeněk. “Databáze specifikací bezpečnostních protokolů .” 2008. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/55620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Papež, Zdeněk. “Databáze specifikací bezpečnostních protokolů .” 2008. Web. 17 Jul 2019.

Vancouver:

Papež Z. Databáze specifikací bezpečnostních protokolů . [Internet] [Thesis]. Brno University of Technology; 2008. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/55620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Papež Z. Databáze specifikací bezpečnostních protokolů . [Thesis]. Brno University of Technology; 2008. Available from: http://hdl.handle.net/11012/55620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

18. Humpolík, Jan. Zabezpečený přístup pro webové aplikace .

Degree: 2010, Brno University of Technology

 Tato práce se zabývá zejména často zanedbávaných součástí zabezpečení každé webové aplikace, ale i bezpečným přístupem samotných uživatelů. Popisuje teoreticky i prakticky moderní techniky zabezpečení,… (more)

Subjects/Keywords: autentizace; autorizace; bezpečný kód; CAPTCHA; ClickJacking; CSRF; DNSSEC; hašovací funkce; HTTP; HTTPS; IDN; instalace webového serveru; SQL injection; SSL/TLS; šifrovaná komunikace; WAMP; XSS; authentication; authorization; CAPTCHA; ClickJacking; CSRF; DNSSEC; encrypted communication; hash function; HTTP; HTTPS; IDN; safe code; SQL injection; SSL/TLS; WAMP; web server setup; XSS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humpolík, J. (2010). Zabezpečený přístup pro webové aplikace . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/5986

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humpolík, Jan. “Zabezpečený přístup pro webové aplikace .” 2010. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/5986.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humpolík, Jan. “Zabezpečený přístup pro webové aplikace .” 2010. Web. 17 Jul 2019.

Vancouver:

Humpolík J. Zabezpečený přístup pro webové aplikace . [Internet] [Thesis]. Brno University of Technology; 2010. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/5986.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humpolík J. Zabezpečený přístup pro webové aplikace . [Thesis]. Brno University of Technology; 2010. Available from: http://hdl.handle.net/11012/5986

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

19. Au, Wai Ki Richard. Agent-based one-shot authorisation scheme in a commercial extranet environment.

Degree: 2005, Queensland University of Technology

 The enormous growth of the Internet and the World Wide Web has provided the opportunity for an enterprise to extend its boundaries in the global… (more)

Subjects/Keywords: distributed authorisation; extranet; Intranet; smart card; personal secure device; authentication; security architecture; security server; trust establishment; trust token; credential-based authorisation; one-shot authorisation token; one-task authorisation key; anonymous attribute certificate; key binding certificate; anonymous authorisation; referee server; privilege negotiation agent; authorisation agent; secure client agent environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Au, W. K. R. (2005). Agent-based one-shot authorisation scheme in a commercial extranet environment. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16708/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Au, Wai Ki Richard. “Agent-based one-shot authorisation scheme in a commercial extranet environment.” 2005. Thesis, Queensland University of Technology. Accessed July 17, 2019. https://eprints.qut.edu.au/16708/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Au, Wai Ki Richard. “Agent-based one-shot authorisation scheme in a commercial extranet environment.” 2005. Web. 17 Jul 2019.

Vancouver:

Au WKR. Agent-based one-shot authorisation scheme in a commercial extranet environment. [Internet] [Thesis]. Queensland University of Technology; 2005. [cited 2019 Jul 17]. Available from: https://eprints.qut.edu.au/16708/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Au WKR. Agent-based one-shot authorisation scheme in a commercial extranet environment. [Thesis]. Queensland University of Technology; 2005. Available from: https://eprints.qut.edu.au/16708/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Assaad, Firas Souhail. Biometric Multi-modal User Authentication System based on Ensemble Classifier.

Degree: MS, Engineering, 2014, University of Toledo

 User authentication performed through the traditional method of authorizing based on username and password results in the weakest link between users and their authentication credentials.… (more)

Subjects/Keywords: Bioinformatics; Computer Engineering; Computer Science; Artificial Intelligence; algorithm; authentication; biometric; classifier; credentials; eigenfaces; multi-modal; recognition; score level; fusion; MFCC; Viola Jones; LBG; Mel Frequency Cepstral Coefficients; voice print; Linde Buzo Gray; ELSDSR; Yale Extended; NIST FERET; Server client

authentication (against the users’ database). Finally, the server will also return the result… …3 Voice Recognition for Biometric Authentication… …83 3.3.2 New User Registration and Authentication… …86 4 Data fusion for Multi-Modal Biometric Authentication: Ensemble Classification… …110 4.3.2 New User Registration and Authentication… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Assaad, F. S. (2014). Biometric Multi-modal User Authentication System based on Ensemble Classifier. (Masters Thesis). University of Toledo. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931

Chicago Manual of Style (16th Edition):

Assaad, Firas Souhail. “Biometric Multi-modal User Authentication System based on Ensemble Classifier.” 2014. Masters Thesis, University of Toledo. Accessed July 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931.

MLA Handbook (7th Edition):

Assaad, Firas Souhail. “Biometric Multi-modal User Authentication System based on Ensemble Classifier.” 2014. Web. 17 Jul 2019.

Vancouver:

Assaad FS. Biometric Multi-modal User Authentication System based on Ensemble Classifier. [Internet] [Masters thesis]. University of Toledo; 2014. [cited 2019 Jul 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931.

Council of Science Editors:

Assaad FS. Biometric Multi-modal User Authentication System based on Ensemble Classifier. [Masters Thesis]. University of Toledo; 2014. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931


Brno University of Technology

21. Ondrák, Richard. Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa .

Degree: 2008, Brno University of Technology

 Tato práce se zabývá problematikou vzdáleného přístupu klientů do korporátní sítě nadnárodního obchodního řetězce Tesco Stores v regionu střední Evropy. Na základě zhodnocení současných možností… (more)

Subjects/Keywords: systém vzdáleného přístupu; VPN („virtuální privátní síť“); IPSec; IKE (Internet Key Exchange); zabezpečení; kryptování; autentizace; referenční model ISO/OSI; RADIUS server; ActiveDirectory; brána Firewall/VPN; Syslog; OWA; RAS; CITRIX/SWA; Certifikační autorita; RSA Secure ID; SLA; DMZ; LAN; WAN; Remote Access System; VPN (Virtual Private Network); IPSec; IKE (Internet Key Exchange); security; encryption; authentication; ISO/OSI model; RADIUS server; ActiveDirectory; Firewall/VPN gateway; Syslog; OWA; RAS; CITRIX/SWA; Certification Authority; RSA Secure ID; SLA; DMZ; LAN; WAN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ondrák, R. (2008). Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/1810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ondrák, Richard. “Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa .” 2008. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/1810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ondrák, Richard. “Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa .” 2008. Web. 17 Jul 2019.

Vancouver:

Ondrák R. Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa . [Internet] [Thesis]. Brno University of Technology; 2008. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/1810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ondrák R. Projekt VPN pro přístup klientů do do korporátní sítě obchodního řetězce v regionu střední Evropa . [Thesis]. Brno University of Technology; 2008. Available from: http://hdl.handle.net/11012/1810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.