Academic literature on the topic 'Autentifikacija'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Autentifikacija.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Autentifikacija"

1

Gvozdanović, Kristina, Polona Margeta, and Vladimir Margeta. "Primjena analitičkih metoda u postupcima autentifikacije poljoprivednih i prehrambenih proizvoda." Stočarstvo 71, no. 1-2 (August 25, 2017): 29–38. http://dx.doi.org/10.33128/s.71.1-2.4.

Full text
Abstract:
Autentifikacija proizvoda služi za dokazivanje sastava i podrijetla poljoprivrednih i prehrambenih proizvoda. Republika Hrvatska ima veliki broj poljoprivrednih i prehrambenih proizvoda koji su zbog specifičnih organoleptičkih, tehnoloških i prehrambenih specifičnosti deklarirani kao proizvodi visoke vrijednosti te zaštićeni oznakom izvornosti, zemljopisnog podrijetla ili zajamčeno tradicionalnog specijaliteta. Provođenje postupka autentifikacije predstavlja multidisciplinarni postupak koji uključuje analitičke metode kombinirane s informatikom, matematikom i statistikom, a sve s ciljem dobivanja što točnijih i pouzdanijih podataka kako bi se mogao donijeti zaključak o podrijetlu i sastavu proizvoda. Zanimanje javnosti za konzumiranjem kvalitetne i sigurne hrane dovelo je do brzog razvoja metoda za autentifikaciju proizvoda. U analitičke metode analize ubrajaju se molekularne metode analize, kromatografske metode, spektrometrijske metode i imunološke metode. U radu su opisane analitičke metode koje se primjenjuju u postupcima dokazivanja izvornosti, zemljopisnog podrijetla ili tradicijskog specijaliteta proizvoda u svijetu.
APA, Harvard, Vancouver, ISO, and other styles
2

Mihajlović, Dragana. "UPOTREBLJIVOST SIGURNOSNIH MEHANIZAMA VEB APLIKACIJA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 36, no. 09 (September 7, 2021): 1521–24. http://dx.doi.org/10.24867/14be13mihajlovic.

Full text
Abstract:
U ovom radu su prikazani osnovni principi online plaćanja i balans između upotrebljivosti i sigurnosti. Predstavljeni su načini autentifikacije za koje korisnici smatraju da su najjednostavniji i najsigurniji te su predstavljeni zahtjevi koji se moraju ispoštovati za poslovanje na Internetu. U ekperimantalnom dijelu analizirane su dvije aplikacije za obavljanje transakcija te vrijeme potrebno za njihovo izvršavanje. Opisane su prednosti i mane aplikacija kao i poboljšanja koja su potrebna da se implementiraju za bolju sigurnost i upotrebljivost.
APA, Harvard, Vancouver, ISO, and other styles
3

Lončarević, Zoran, Muzafer Saračević, and Muhedin Hadžić. "Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology." Ekonomski izazovi 7, no. 13 (2018): 119–39. http://dx.doi.org/10.5937/ekoizazov1813119l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cvetković, Aleksandar Sandro, and Saša Adamović. "Šifrovanje baze podataka sa više korisnika." ZBORNIK RADOVA UNIVERZITETA SINERGIJA 8, no. 3 (April 18, 2019). http://dx.doi.org/10.7251/zrsng1708068c.

Full text
Abstract:
Kerberos je protokol za autentifikaciju. Dizajniranje da omogući jaku autentifikaciju za klijet-server aplikacijekoristeći kriptografiju tajnog ključa. Kerberos je nastao kaorešenje za probleme mrežne sigurnosti i razvijen je od straneMIT-a. Kerberos protokol koristi jaku kriptografiju kako biklijent mogao da dokaže svoj identitet serveru i obrnuto prekonesigurne mreže. Nakon što su klijent i server dokazali svojeidentitete preko Kerberosa, oni takođe mogu šifrovatni njihovukompletnu komunikaciju kako bi privatnost i integritet podatakabio osiguran. U ovom radu bavili smo se simulacijom radaKerberos protokola. Detaljno su opisana podešavanja ifunkcionalnosti kao i koje sve vrste implementacija postoje zaKerberos protokol i kakvu vrstu bezbednost pruža. Takođe jeopisano koje su prednosti i mane ovog protokola. Kerberosprotokol je predstavljen kao novo rešenje za autentifikaciju išifrovanje baze podataka sa više korisnika.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Autentifikacija"

1

Maklakova, Natalija. "Autentifikacijos protokolų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003.

Full text
Abstract:
In this paper I examine the possibilities of subject authentification, cryptographic methods of authentification in symmetrical and asymmetrical criptology systems (for instance, on-line and off-line regimes authentification; authentification with the participation of a two servers or an arbiter, etc.). Much attention was given to study, analyzing possibilities of computer trespasser to penetrate into the protocol, to deceive the authentification server, to change public key by its own public key, etc. A more detailed study of three protocols was carried out (Feige-Fiat-Shamir, GQ and Schnorr), concrete examples of these protocols are described, and made conclusions about safety of protocols, probability of forgery, on selection of more suitable parameters.
APA, Harvard, Vancouver, ISO, and other styles
2

Kulikauskas, Kristijonas. "Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857.

Full text
Abstract:
Automobilių apsauga visada buvo, yra ir bus aktuali. Esamos apsaugos priemonės nesunkiai apeinamos ir nesudaro didelių kliūčių, norint transporto priemonę pasisavinti. Reikalinga naujoviška vairuotojo autentifikavimo sistema, galinti sumažinti šią, pasisavinimo tikimybę. Tam tinka biometrija – asmens bruožų ar charakteristikų statistinė analizė ir nustatymas. Juos nustačius, gali būti naudojami asmens autentifikacijai. Tai daroma lyginant su anksčiau užfiksuotu šablonu. Naudojama šioms autentifikacijoms: kompiuteriuose tinklų, praėjimo kontrolės, bankomatuose, apsipirkimams kreditinėmis kortelėmis, mobiliuosiuose telefonuose, delniniuose kompiuteriuose, medicininių įrašų valdymui, nuotoliniame mokymesi ir t.t. Pirštų kraujagyslės – nauja biometrinės autentifikacijos forma. Kadangi kraujagyslės yra po oda, jos yra nematomos apšviečiant natūralia šviesa. Tačiau jos puikiai matomos apšvietus artima infraraudoniems spinduliams šviesa. Šiame tyrime buvo sukurtas ir ištirtas biometrinės autentifikacijos automobiliams modelis. Ištirtas trijų atvaizdų apdorojimo algoritmų tinkamums, nustatant kuris jų mažiausia jautrus raiškos ir triukšmo pasikeitimams. Jį ir siūlome naudoti šiame autentifikacijos modelyje.
Automobile security is always relevant. Existing security systems could be easily bypassed and are not a big barrier for thieves. So there is a necessity for a innovative authentication system. Biometrics consist of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It could be also used for automobile security. Finger vein comparison is a relatively new form of biometrics, which could also be used for authentication. Images of finger veins could be obtained illuminating fingers with near-infrared light. Those images are very unique and different for every person and every finger. In this research biometric authentication model for automobiles is developed and researched. Three image recognition algorythms were tested in the experiment, determining which one is less sensitive to resolution changes and noise. The results were given, proposing use of one algorythm, in our model of biometric authentication system for automobiles.
APA, Harvard, Vancouver, ISO, and other styles
3

Petrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.

Full text
Abstract:
Tobulėjant mobilioms technologijoms vietos informacija tapo svarbi prieigos valdymui. Šiame darbe analizuojamos vietos informacijos derinimo su autentifikacijos ir prieigos valdymo mechanizmais galimybės. Darbe išskirti vietos informacijos įvedimo į autentifikacijos, prieigos valdymo ir atskaitomybės procesus privalumai. Pristatomas vietos informacija paremtas prieigos prie tinklo resursų valdymo modelis, kuris leidžia padidinti teisingo autentifikavimo tikimybę bei išplėsti prieigos valdymo galimybes. Suprojektuota prieigos prie bevielio tinklo valdymo sistema, pritaikyta veikti kelių aukštų pastate. Modelis yra suderinamas su OGC (Open GeoSpatial Consortium) ir Geo-RBAC (RBAC modelio išplėtimu), į jį įtraukti kitų tipų vietos informacija pagrįsti požymiai. Darbe pristatomi prieigos valdymo išplėtimai: periodiškumo algoritmas ir erdvinių požymių įvertinimo algoritmas, naudojantis susiejimo funkcijas ir įvertinantis vietos nustatymo patikimumą. Pasiūlyto prieigos valdymo modelio veikimas įvertinamas eksperimentais, nurodomi jo galimi pažeidžiamumai.
Location-based Access Control LBAC techniques allow taking users’ physical location into account when determining their access privileges. The analysis of possibilities of integrating location information into access control and authentication is provided. I show the advantages of using location information for authentication and access control. I present location-based access control model that can increase the probability of correct authentication. I design wireless LAN location-based access control system that is used in building of several floors. The model is compliant with OGC (Open GeoSpatial Consortium) and Geo-RBAC (the extent of RBAC model); it integrates other types of location-based features. I describe the periodicity algorithm of location-based access control and design the policy enforcement algorithm that uses location mapping functions and the evaluation of confidence. The model is evaluated by testing the speed of the system and computer resources used by the system. The vulnerabilities of location-based access control are discussed in the context of sniffing, highjacking, DoS and warmhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Pořízka, Jaromír. "Využití analytických technik a chemometrie k autentifikaci vín." Doctoral thesis, Vysoké učení technické v Brně. Fakulta chemická, 2015. http://www.nusl.cz/ntk/nusl-234569.

Full text
Abstract:
This PhD. thesis is focused on application of different analytical techniques for determination of elemental composition of Moravian wine combined with analysis of selected polyphenol compounds. Two spectrometric techniques were used for elemental analysis of wine – Mass spectrometry and Optical emission spectrometry with inductively coupled plasma (ICP-MS and ICP-OES). Analysis of organic constituents of wine was evaluated by High performance liquid chromatograph with diode array detector (HPLC-DAD). Data from analysis of wine were used for construction of mathematical models for determining geographical origin of wine and for determining type of varietal wine. Data handling was performed by usage of multivariate statistical methods (cluster analysis, principal component analysis and canonical discriminant analysis). For the discrimination of wine by the geographical origin, two separate models for white and red wine were constructed. Effectiveness of discrimination of Moravian wine (with knowledge about origin) into 4 wine regions was 100 % successful for white wine and 96,43 % for red wine samples. Those models were used for cross validation test of unknown samples with result 95 % successfully classified samples of white wine and 82,15% of red wine. Besides that, mathematical model for discrimination and classification of varietal wine was made. Müller Thurgau, Riesling and Gruner Veltliner were discriminated by the usage of 8 elemental parameters. Discrimination success rate of known samples was evaluated by canonical discriminant analysis with 95,83% of correctly classified known samples and 70,83% of correctly classified unknown varietal wine (cross validation test). In addition to these part of research, impact of different grape production systems on elemental composition of wine and Vitis Vinifera was studied. The core of the study was to find the connections between the type of agriculture and chemical properties of wine and Vitis Vinifera. Two agriculture systems were assessed – Organic agriculture and Integrated pest management. . Results of this study showed that quantity and manner of pesticide application is very important factor affecting the final elemental composition of the grapevine and wine, especially the content of copper, zinc and manganese. That knowledge can be used in the future for creation of classification model of wine according to grape production system. For comparison of radical scavenging activity, electron paramagnetic resonance spectroscopy (EPR) with DPPH method was used. In the case of this study, the influence of vine growing under different farming systems on the total antioxidant activity of wine was found to be insignificant.
APA, Harvard, Vancouver, ISO, and other styles
5

Mjachky, Ľuboš. "Generativní adversarialní neuronové sítě využity na ochranu soukromí při biometrické autentifikaci a identifikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445583.

Full text
Abstract:
Systémy založené na biometrickej autentizácii sa stávajú súčasťou nášho každodenného bytia. Tieto systémy však nedovoľujú používateľom priamo alebo nepriamo meniť spôsob, akým sa k ich dátam pristupuje a ako sa s nimi bude zaobchádzať ďalej v budúcnosti. Dôsledkom tohto môžu vyplynúť riziká spojené s uniknutím identity jedinca. Táto práca sa zaoberá návrhom systému, ktorý zachováva privátnosť a zároveň umožňuje autentizáciu na základe biometrických čŕt používateľov, a to za pomoci generatívnej neurónovej siete (GAN). V práci sa konkrétne uvažuje o tom, že GAN je použitá na transformáciu obrázkov tvárí napríklad na obrázky kvetov. Autentizačný systém sídliaci na serveri je v konečnom dôsledku učený rozlišovať používateľov podľa obrázkov kvetov a nie tvárí. Na základe vykonaných experimentov môžeme potvrdiť, že navrhovaná metóda je robustná voči útokom, pričom stále vykazuje kvalitatívne požiadavky kladené na štandardný autentizačný systém.
APA, Harvard, Vancouver, ISO, and other styles
6

Lozda, Marius. "Elektroninio parašo atributų sertifikavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2011~D_20140627_165731-47089.

Full text
Abstract:
Darbe nagrinėjama atributinės informacijos sertifikavimo šiuo metu naudojamuose elektroniniuse parašuose problema. Trumpai apžvelgiami elektroninio parašo principai ir supažindinama su viešųjų raktų infrastruktūra, nurodant galimybes jai išplėsti, iškilus poreikiui užtikrinti aukštesnį saugumo lygį keičiantis papildoma (atributine) informacija. Nagrinėjami įvairūs atributinės informacijos sertifikavimo metodai, viešųjų raktų infrastruktūroje įvedant atributų sertifikato ir atributų sertifikavimo centro sąvokas. Pateikiamas tinkamiausio metodo pritaikymo pavyzdys, modeliuojant elektroninio parašo naudojimo situaciją, artimą dabartinei situacijai Lietuvoje. Sprendimo pritaikymas demonstruojamas apibrėžiant patobulintos elektroninio parašo infrastruktūros prototipą.
This paper analyses issues of attribute certification in currently used electronic signatures. Fundamentals of electronic signatures and public key infrastructure are briefly described, focusing on possibilities of achieving higher security level in communication when attribute information is important. Various suggestions for attribute certification are analysed, introducing atribute certificates and atribute authorities. Different certification methods are compared and evaluated, applying the most suitable one in the public key infrastructure usage model, that is constructed by simplifying the current situation of electronic signatures. The solution is represented by describing the prototype of improved electronic signature infrastructure.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Autentifikacija"

1

Marjanović, Marko. "Kombinovanje biometrije i lozinki u savremenim servisima autentifikacije." In Sinteza 2014. Belgrade, Serbia: Singidunum University, 2014. http://dx.doi.org/10.15308/sinteza-2014-984-989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pilepić Stifanich, Ljubica. "TRENDOVI U BIOMETRIJI: METODA AUTENTIFIKACIJE I PRIMJERI KORIŠTENJA U TURIZMU I HOTELIJERSTVU." In 4th International Scientific Conference – EMAN 2020 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/eman.2020.411.

Full text
Abstract:
Cilj ovoga rada je istražiti jednu relativno mladu tehnologiju, koja će po svim pokazateljima postati temelj svih sigurnosnih aplikacija u svijetu u budućnosti. Budući da živimo u brzorastućem, informacijskom i digitalnom dobu gdje se svakoga dana razvijaju nove tehnologije, prikazati će se i detaljno analizirati neke biometrijske metode i tehnike koje su danas u upotrebi s posebnim naglaskom na sektor turizma i hotelijerstva. Radi se o primjeni sustava za identifikaciju lica u turizmu s posebnim osvrtom na biometrijsku provjeru putnika u zračnim lukama, mogućnostima biometrijskog plaćanja otiskom prsta, efikasnijem upravljanju osobljem u području vođenja evidencije radnog vremena i kontroli pristupa. Biometrijska tehnologija tom sektoru nudi mogućnost da se izdigne iznad tradicionalnih koncepata u poboljšanju sigurnosti i cjelokupnog iskustva gostiju. Hoteli na taj način mogu poboljšati sustav upravljanja, a gostima se nudi najviši nivo komfora i pogodnosti. U radu se istražuju mogućnosti, snage i slabosti biometrije te utjecaj biometrije na čovjeka koji je u izravnoj interakciji s njom. Koliko su zapravo pouzdani biometrijski sustavi, štite li našu privatnost i ljudska prava samo su neka od pitanja na koja ovaj rad pokušava iznaći odgovore.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography