Radek Holy
Czech Technical University in Prague
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Radek Holy.
international conference on signal processing and communication systems | 2012
Radek Holy; Marek Kalika; Jan Scherks
Identification of persons in contact with the information systems of organizations is a very important aspect of the security of the entire system. One of the options used for this purpose is a smart card. Therefore added security in form of combination of more complex architecture and chip card with biometric is desired in todays world. In the implementation of the smart card technology it is necessary to emphasize the level of security, which affect how contactless or contact chip card applications in memory chip.
digital image computing: techniques and applications | 2012
Radek Holy; Marek Kalika; Jan Scherks
Personnel identification is everyday struggle between each individual and security personnel. This is equally important on academic grounds where unauthorized individuals could access university resources and university research. We can assume that every academic individual poses university identification card that can be used for access to restricted areas, computers, library or cafeterias but this identity card can be lost, stolen or borrowed to someone else. Therefore added security in form of combination of more complex chip card architecture and biometric is desired in todays world.
international conference on anti-counterfeiting, security, and identification | 2012
Radek Holy; Jana Kalikova; Marek Kalika
Personal identification is everyday struggle between each identified individual and the security personnel. This is equally important on academic grounds where unauthorized individuals could access university resources and university research. Even in case that every member of the academic staff is a holder of the university identification card used for access to restricted areas, computers, library or cafeterias, this identity card can be lost, stolen or borrowed to someone else. Therefore added security in form of combination of more complex chip card architecture and biometric is desired to ensure a proper level of protection.
international symposium on next generation electronics | 2018
Radek Holy; Jiri Havlik; Marek Kalika; Michal Kasparek
This document deals with integration of a recent semiconductor components within rapidly growing automotive sector. Researchers combined advanced technologies and proven car communication concepts aiming to development of demanded functionalities and demonstrating them on two use cases. Researchers started with technology analysis, have done defined experiments on the new components and specified representative use cases. Outcomes of the research will address two main stakeholder groups — car users and vehicle infrastructure operators enabling them entirely new comfort of taking care of vehicles both on professional and user basis.
2016 Smart Cities Symposium Prague (SCSP) | 2016
Jiri Havlik; Jan Schlechter; Pavel Krejsa; Libor Janda; Marek Kalika; Radek Holy
The article describes the architecture and use cases of the vehicles external control unit (BBCU - BODY & BOARD CONTROL UNIT) for the vehicle communication within global traffic systems including traffic security and safety (Car2Car, Car2Infrastructure concepts supported), IoT architectures as well as Smart Cities applications. The BBCU is an embedded system optionally supplemented with graphical user interface installed inside the vehicle and designed to fulfil three basic functions. The function of an event recorder storing data from sensors installed both inside and outside the vehicle. It monitors and records data of the trip and other significant events. The other function is the communication with peripheral systems installed inside the vehicle (IR cameras, RFID readers etc.). The third function is the analysis of data received from peripheral systems and transmission of data to the system eCall as under preparation and other transport applications. What has to be safeguarded for this purpose are free interfaces, computing capacity, safe and fast data storage.
wireless and optical communications conference | 2015
Marek Neruda; Lukas Vojtech; Matej Rohlik; Jiri Hajek; Radek Holy; Marek Kalika
New designed power systems of electric and hybrid vehicles influence other systems by generated disturbing electromagnetic field. One of the promising measures to mitigate this negative effect can be found in additional shielding of cables, which can be provided by electrically conductive textile materials. This paper focuses on verification of utilization of specifically designed shielding textile material, which are used as additional cable shielding in order to prevent undesirable effects of electromagnetic disturbance on data transmission. The results of our measurements verify that this concept provides advantageous characteristics of electrically conductive textile materials such as shielding capability, elasticity and easy handling.
international symposium on next generation electronics | 2015
Radek Holy; Marek Kalika; Lukas Voparil
This paper presents already built a public key infrastructure in the university environment. Infrastructure was established to enhance the security and credibility of the university systems and as a support for the development of a fully electronic flow of documents at the university. The article describes the main elements of the PKI along with the problems that had to be solved when deployed to a specific environment of the university.
international conference on intelligent green building and smart grid | 2014
Radek Holy; Marek Kalika; Jana Kalikova; Jiri Havlik; Petr Barak; Jakub Neburka
Nowadays ICT technology is infiltrated to all areas of human existence and the number of objects, animate or inanimate, actively acting within Internet services is rapidly growing. The reasons of object monitoring are permanently changing and evolving, following the development of public and non-public sectors. For example using of various tags, stuck on goods, are used for goods identification in stores and for security reasons for many years. Further, the assets identification using passive tags turns to active identification enabling automatic inventorying and permanent assets protection at the same time. Active identification provides also the remote monitoring of objects, moreover, when objects data are safely shared on Internet environment, a number of cloud services can be enabled to allow customers remote monitoring of objects. Based on such ICT environment, the architecture called Internet of Things is ready to come to daily life. The objects considered in such systems can be home appliances, medical devices, building assets, computers, mobile devices, cars, production components, manufacturing tools, building materials and, of course, people. Especially the bindings and relations among objects, for example an identified person having an expensive identified device and passing unauthorized zone is evaluated as a risk transaction resulting to a denied access. Beside the object identification the differentiation of static and moving objects brings a new important parameter to improve the IoT concept.
international conference on intelligent green building and smart grid | 2014
Radek Holy; Petr Bı́lek; Lukas Voparil
In the university environment, as well as in many other institutions and industrial companies there are a large number of different assets. Significant differences from other enterprises or institutions are the large variation in purchase and huge turnover of assets. Exceptionally assets are lent or transferred between faculties, relatively frequent are exchanges and long-term loans between departments. Very common is the movement of assets within a single department. Although according to the internal regulations there is mandatory for any transfer of property to create transfer documentation. It does only in the first two cases, when transfers are outside the department or faculty. The result is long-lasting legitimate inventory at the end of the year, a large number of the missing property and often critical situations acting on interpersonal relationships. The reason is clear - it is not humanly possible for asset manager to handle from several thousand to tens of thousands of shifts, loans and transfers of assets per year.
international conference on information intelligence systems and applications | 2013
Radek Holy; Marek Kalika; Jana Kalikova
Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.