This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n13http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n17http://purl.org/net/nknouf/ns/bibtex#
n12http://localhost/temp/predkladatel/
n18http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n15http://linked.opendata.cz/resource/domain/vavai/subjekt/
n14http://linked.opendata.cz/ontology/domain/vavai/
n21https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28140%2F11%3A43865791%21RIV12-MSM-28140___/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n4http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28140%2F11%3A43865791%21RIV12-MSM-28140___
rdf:type
skos:Concept n14:Vysledek
dcterms:description
This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions. This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions.
dcterms:title
Cybercrime in Modern Secured Information Environment Cybercrime in Modern Secured Information Environment
skos:prefLabel
Cybercrime in Modern Secured Information Environment Cybercrime in Modern Secured Information Environment
skos:notation
RIV/70883521:28140/11:43865791!RIV12-MSM-28140___
n14:predkladatel
n15:orjk%3A28140
n3:aktivita
n19:S
n3:aktivity
S
n3:dodaniDat
n4:2012
n3:domaciTvurceVysledku
n18:1905457
n3:druhVysledku
n16:D
n3:duvernostUdaju
n6:S
n3:entitaPredkladatele
n20:predkladatel
n3:idSjednocenehoVysledku
192569
n3:idVysledku
RIV/70883521:28140/11:43865791
n3:jazykVysledku
n11:eng
n3:klicovaSlova
HASH, hash function, fractal geometry, information system, security, information security, authentication, protection, fractal set
n3:klicoveSlovo
n7:information%20security n7:security n7:authentication n7:protection n7:fractal%20set n7:hash%20function n7:HASH n7:information%20system n7:fractal%20geometry
n3:kontrolniKodProRIV
[A312CAED9F52]
n3:mistoKonaniAkce
Zlín
n3:mistoVydani
Zlín
n3:nazevZdroje
Conference Proceedings Internet, Competitiveness and Organizational Security
n3:obor
n5:IN
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
1
n3:rokUplatneniVysledku
n4:2011
n3:tvurceVysledku
Motýl, Ivo
n3:typAkce
n13:EUR
n3:zahajeniAkce
2011-03-16+01:00
s:numberOfPages
5
n17:hasPublisher
Fakulta aplikované informatiky Univerzity Tomáše Bati ve Zlíně
n21:isbn
978-80-7454-012-7
n12:organizacniJednotka
28140