All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

58 014 (0,174s)

Result

Mineral content as a criterion of authentication of wines

Mineral content as a criterion of authentication of wines...

CB - Analytická chemie, separace

  • 2003
  • D
Result

Mineral content as a criterion of authentication of beverages

Mineral content as a criterion of authentication of beverages...

CB - Analytická chemie, separace

  • 2002
  • D
Result

Evaluation of autethenticity of ketchups - determination of tomato content

The aim of the work was to evaluate the authenticity of ketchups and determiantion of tomatoto content in ketchups according to analyses of various chemical markers....

GM - Potravinářství

  • 2007
  • D
Result

Determination of isocitric acid content in fruit juices - detection of authenticity.

Determination of isocitric acid content in fruit juices - detection of authenticity.

GM - Potravinářství

  • 2002
  • Jx
Result

Filbertone as the marker of hazelnut content

For the evaluation of the hazelnut paste authenticity and hazelnut content the chemical marker Filbertone was chosen and determined by GC/MS....

GM - Potravinářství

  • 2007
  • D
Result

Application for the Security of Web Site Content

These are a few stand-alone applications developed in JavaScript allows you to test the used security methods, which are mainly: steganography, cryptography and authentication. Furthermore, it is a custom solution that provides an additional...

JC - Počítačový hardware a software

  • 2012
  • R
  • Link
Result

Strong Authentication for Internet Application

This contribution discusses algorithms for strong authentication authentication using USIM / ISIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2017
  • D
Result

TO KEEP THE CONTENT AND VISUAL - ART FORMS OF EXPRESSION IN STUDENTS AND THEIR FUTURE TEACHERS FROM LOSING THEIR ORIGINALITY, AUTHENTICITY, IDENTITY AND AGE SUITABILITY...

The transcription of authentic imaginary shapes in artistic signs is a problem very often studied in the history of fine arts, visual studies, Czech art education and its history. In this context, issues concerning the further development of...

AM - Pedagogika a školství

  • 2015
  • D
Result

Strong password authentication with AKA authentication mechanism

This contribution discusses algorithms for strong authentication authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole contro...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2017
  • D
Result

Experts Examination and Handwriting Examination and its Significance in the Criminal Proceedings

The authors in their paper discuss in theoretical and practical level the importance of experts examination and handwriting examination and its significance in criminal proceedings in assessing the authenticity of the signature of the maker/...

AG - Právní vědy

  • 2011
  • Jx
  • 1 - 10 out of 58 014