Publikace UTB
Repozitář publikační činnosti UTB

Advanced user authentication process based on the principles of fractal geometry

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Advanced user authentication process based on the principles of fractal geometry en
dc.contributor.author Motýl, Ivo
dc.contributor.author Jašek, Roman
dc.relation.ispartof Recent Advances in Signal Processing, Computational Geometry and Systems Theory - ISCGAV'11, ISTASC'11
dc.identifier.isbn 978-1-61804-027-5
dc.date.issued 2011
dc.citation.spage 109
dc.citation.epage 112
dc.event.title 11th WSEAS International Conference on Signal Processing, Computational Geometry and Artificial Vision, ISCGAV'11, 11th WSEAS International Conference on Systems Theory and Scientific Computation, ISTASC'11
dc.event.location Florence
utb.event.state-en Italy
utb.event.state-cs Itálie
dc.event.sdate 2011-08-23
dc.event.edate 2011-08-25
dc.type conferenceObject
dc.language.iso en
dc.relation.uri http://www.wseas.us/e-library/conferences/2011/Florence/GAVTASC/GAVTASC-17.pdf
dc.subject Authentication en
dc.subject Fractal geometry en
dc.subject Fractal set en
dc.subject HASH en
dc.subject Hash function en
dc.subject Information security en
dc.subject Information system en
dc.subject Protection en
dc.subject Security en
dc.description.abstract This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1005157
utb.identifier.rivid RIV/70883521:28140/11:43865789!RIV12-MSM-28140___
utb.identifier.obdid 43865805
utb.identifier.scopus 2-s2.0-82655171962
utb.source d-scopus
dc.date.accessioned 2015-06-29T11:54:14Z
dc.date.available 2015-06-29T11:54:14Z
utb.contributor.internalauthor Motýl, Ivo
utb.contributor.internalauthor Jašek, Roman
utb.fulltext.affiliation IVO MOTÝL, ROMAN JAŠEK Department of Informatics and Artificial Intelligence Thomas Bata University Faculty of Applied Informatics nám. T.G.Masaryka 5555 Czech Republic motyl@fai.utb.cz, jasek@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] Piller, I., Hashovací funkce a jejich využití při autentizaci, Vysoké učení technické v Brně, 2009 [2] Tříska, D., Kryptografická ochrana, Univerzita Tomáše Bati ve Zlíně, 2009. [3] Oracle ThinQuest, available from: <http://library.thinkquest.org/07aug/01676/relevance_cryptographictechnologies_authentication_hashcodes.html>. [4] Zelinka, I. Fraktální geometrie – principy a aplikace, BEN Praha 2006. [5] The Mandelbrot set, available from: <http://warp.povusers.org/Mandelbrot/> [6] Lofstedt, T. Fractal Geometry, Graph and Tree Constructions, Umea University, Sweden 2008.
utb.fulltext.sponsorship This article was supported by the European Regional Development Fund under the Project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089 and Internal grant agency (IGA/29/FAI/11/D).
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam