"1"^^ . . . "S" . . "Conference Proceedings Internet, Competitiveness and Organizational Security" . . . "5"^^ . "1"^^ . "Cybercrime in Modern Secured Information Environment"@en . "RIV/70883521:28140/11:43865791!RIV12-MSM-28140___" . "HASH, hash function, fractal geometry, information system, security, information security, authentication, protection, fractal set"@en . "Cybercrime in Modern Secured Information Environment" . "This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions." . . . "Cybercrime in Modern Secured Information Environment"@en . "RIV/70883521:28140/11:43865791" . . "Mot\u00FDl, Ivo" . "28140" . . "Cybercrime in Modern Secured Information Environment" . . "Zl\u00EDn" . "Zl\u00EDn" . . . "Fakulta aplikovan\u00E9 informatiky Univerzity Tom\u00E1\u0161e Bati ve Zl\u00EDn\u011B" . . . "This article is focused on authentication of users inside and outside the information systems. For this purpose is widely used hash function. The proposed process is based on the elements of the fractal geometry. The algorithm here uses a wide range of the fractal sets and the speed of its generation. The system is based on polynomial fractal sets, specifically on the Mandelbrot set. The system meets all the conditions for the construction of hash functions."@en . . . . . "2011-03-16+01:00"^^ . . . . "[A312CAED9F52]" . . "978-80-7454-012-7" . "192569" .