Search Results - "Kodl, Jindrich"
-
1
The CNS stochastically selects motor plan utilizing extrinsic and intrinsic representations
Published in PloS one (02-09-2011)“…Traditionally motor studies have assumed that motor tasks are executed according to a single plan characterized by regular patterns, which corresponds to the…”
Get full text
Journal Article -
2
Implementing trustworthy dynamic biometric signature according to the electronic signature regulations
Published in 2013 47th International Carnahan Conference on Security Technology (ICCST) (01-10-2013)“…Many countries of the world exercise legal regulations, which embedded electronic signature based on asymmetric cryptography in their legislation. However,…”
Get full text
Conference Proceeding -
3
Data boxes in the Czech Republic and their security
Published in 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (01-10-2010)“…In 2009 Czech Republic introduced a completely new tool for electronic communication with public authority and consequently, individual users themselves. It is…”
Get full text
Conference Proceeding -
4
Comparative Study of Cryptographic and Biometric Signatures
Published in 2021 International Carnahan Conference on Security Technology (ICCST) (11-10-2021)“…The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in…”
Get full text
Conference Proceeding -
5
Development trends of electronic authentication
Published in 2008 42nd Annual IEEE International Carnahan Conference on Security Technology (01-10-2008)“…Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a…”
Get full text
Conference Proceeding -
6
Assessment of the authenticity of Dynamic Biometric Signature: The results of experiments
Published in 2014 International Carnahan Conference on Security Technology (ICCST) (01-10-2014)“…Nowadays the use of Dynamic Biometric Signature (DBS) is already an important alternative to the standard electronic signatures based on cryptographic methods…”
Get full text
Conference Proceeding -
7
Influence of hypoxia on the stability of the dynamic biometric signature
Published in 2019 International Carnahan Conference on Security Technology (ICCST) (01-10-2019)“…The research presented in this paper follows previous experiments with the stability of dynamic biometric signature (DBS) under the influence of various…”
Get full text
Conference Proceeding -
8
The influence of stress on biometric signature stability
Published in 2016 IEEE International Carnahan Conference on Security Technology (ICCST) (01-10-2016)“…This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under…”
Get full text
Conference Proceeding -
9
About the Abuse Options of the Dynamic Biometric Signature
Published in 2018 International Carnahan Conference on Security Technology (ICCST) (01-10-2018)“…The paper examines the possibilities of exploiting a dynamic biometric signature (hereinafter referred to as "DBS") by forging a DBS when having knowledge of…”
Get full text
Conference Proceeding -
10
Stability of a dynamic biometric signature created on various devices
Published in 2017 International Carnahan Conference on Security Technology (ICCST) (01-10-2017)“…The paper directly follows on from the prior research on the dynamic biometric signature (DBS), its properties, security, its resistance to forgery, and its…”
Get full text
Conference Proceeding -
11
Real-time Control of Whole-body Robot Motion and Trajectory Generation for Physiotherapeutic Juggling in VR
Published in 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (01-10-2018)“…Motor rehabilitation is in increasingly high demand to deal with minor functional motor impairments resulting from stroke, cerebellar ataxia, or Parkinson's…”
Get full text
Conference Proceeding -
12
The dynamic biometric signature - Is the biometric data in the created signature constant?
Published in 2015 International Carnahan Conference on Security Technology (ICCST) (01-09-2015)“…Biometric authentication methods are increasingly proving to be a sensible compromise between the demands on the user and/or the authentication tools without…”
Get full text
Conference Proceeding Journal Article -
13
Strong authentication using dynamic biometric signature
Published in 2011 Carnahan Conference on Security Technology (01-10-2011)“…This paper examines the current status in the field of securing electronic documents through cryptographic tools such as electronic signatures, electronic mark…”
Get full text
Conference Proceeding -
14
Mechanisms of human arm motion planning in the presence of multiple solutions
Published 01-01-2010“…How do humans choose their movement and what are the mechanisms involved in motion planning? This thesis explores the interaction of the central nervous system…”
Get full text
Dissertation