. ==== Zaproszenie na obronę pracy doktorskiej ==== \\ ^ **DZIEKAN i RADA WYDZIAŁU** \\ **INFORMATYKI, ELEKTRONIKI I TELEKOMUNIKACJI** \\ **AKADEMII GÓRNICZO-HUTNICZEJ im. ST. STASZICA W KRAKOWIE** ^^ | zapraszają na \\ publiczą dyskusję nad rozprawą doktorską \\ \\ //mgr inż. Sebastiana Szlósarczyka// \\ || | **Towards Mobile Security - Voice based authentication protocol to biometrically harden secure encryption and data communication schemes** || ^ Termin:|8 czerwca 2017 roku o godz. 11:00 | ^ Miejsce:|sala 1.20, pawilon D-17, \\ ul. Kawiory 21, 30-059 Kraków | ^ **PROMOTOR:**|Prof. dr hab. inż. Krzysztof Zieliński, Akademia Górniczo-Hutnicza im. Stanisława Staszica | ^ ** RECENZENCI:**|Prof. dr hab. inż. Roman Wyrzykowski - Politechnika Częstochowska | ^ ** **|dr hab. inż. Krzysztof Szczypiorski, prof. n. – Politechnika Warszawska | | Z rozprawą doktorską i opiniami recenzentów można się zapoznać \\ w Czytelni Biblioteki Głównej AGH, al. Mickiewicza 30 || \\ ---- \\ ==== Towards Mobile Security - Voice based authentication protocol to biometrically harden secure encryption and data communication schemes ==== \\ //mgr inż. Sebastian Piotr Szlósarczyk// \\ **Promotor:** prof. dr hab. inż. Krzysztof Zieliński (AGH) \\ **Dyscyplina:** IT Security \\ ==== Abstract ==== The dissertation thesis with the title Towards mobile security - Voice based authentication protocol to biometrically harden secure encryption and data communication schemes written by Sebastian Piotr Szlósarczyk focuses on the realisation of the improvements in the field IT security. IT security is mainly countering any kind of threats all users face in different environments of information technology and their (network) architecture. The contribution tackles biometric doubts and proposes a new cryptographic protocol which counters password protocol weaknesses. The innovation is a voice based authentication protocol which is able to harden any type of secure encryption and data communication schemes biometrically in order to overcome security threats. The complexity of the presented protocol is outlined in contrast to current schemes and the importance of the developed mathematical structure is presented. Further the research result concludes that the development improves security awareness as psychological fact with the voice’s biometric fingerprints as well as it opens future research possibilities of stating security levels by examining audio fingerprints more thoroughfully. ---- ==== Autoreferat ==== {{:2017:szlos:autoreferat_diss_sszlosarczyk.pdf|}} \\ ---- ---- ==== Recenzje ==== {{:2017:szlos:recenzja_prof._wyrzykowski.pdf|}} {{:2017:szlos:recenzja_dr_hab._szczypiorski.pdf|}} ---- \\ **Ważniejsze publikacje dokotoranta**: - Chenguang Yang: Security in Voice Authentication, A Dissertation // March 2014 // - Sebastian Szlósarczyk, Andrea Schulte.Voice Encrypted Recognition Authentication – VERA. // Next Generation Mobile Applications, Services and Technologies, 9th In-ternational Conference,//, October 2015// // - J. Bonneau.Guessing Human-chosen Secrets.//PhD Thesis, University of Cambridge,//, May 2012// // - J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. //IEEE Security & Privacy (Oakland) 2012. San Francisco, CA, USA.//,