• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 30
  • 23
  • 13
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 139
  • 35
  • 32
  • 31
  • 30
  • 26
  • 26
  • 23
  • 23
  • 22
  • 19
  • 18
  • 17
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

RFID-(o)säkerhet med enkla medel

Gavelin, Emil, Gidensköld, Tinny January 2018 (has links)
Genom att använda enkla medel i de undersökande experiment som utförts påvisas fortsatt stora brister i RFID-säkerheten hos MIFARE-enheterna. Där dyr och avancerad utrustning tidigare varit ett krav för att utnyttja bristerna kan nu betydligt billigare och mer lättillgänglig utrustninganvändas. Med hjälp av en Arduino och en mobiltelefon kan exempelvis resekort, passerkort och bankkort läsas av och delvis eller helt kopieras för att utnyttjas i ont syfte. Diskussion förs kring CIA-triangelns tre delar, konfidentialitet, integritet samt tillgänglighet. I och med att det i dag är mer eller mindre omöjligt att välja bort RFID-tekniken, ger examensarbetet även förslag på lösningar till de säkerhetsbrister som påvisas. Utöver detta tar uppsatsen även upp RFID-relaterade brott samt den pågående rättegång där en busschaufför misstänks för bedrägeri genom att sälja falska resekort.
62

RFID technologie a její použití ve zvoleném podniku / RFID Technology and its Use in Selected Enterprise

Brožová, Natálie January 2016 (has links)
This thesis focuses on the topic of RFID - radio frequency identification of objects. The theoretical part is focused on the definition and history of RFID systems, the main components of this technology, regulation and standards in the use of RFID, categories of RFID and its implementing into business processes. The theoretical part also describes the costs of RFID, potential benefits arising from its implementation and examples of areas in which RFID technology is applied. The practical part deals with the implementation of RFID in a particular company and describes situation of the company before and after the RFID implementation. Furthermore, practical part summarizes the results of interviews with employees of the company and a listing of key benefits that RFID has brought. At the end of the practical part the author proposes some improvements to the existing use of RFID system.
63

Vývoj mobilních zařízení a jejich využití / Evolution of mobile devices and their utilization

Němec, Ondřej January 2016 (has links)
This thesis is focused on the development of mobile devices and their usage. The thesis gives basic overview of mobile phones, including their historical development. It also contains an analysis of the condition and the possibility of utilization of these devices. There are mentioned currently best selling phones and their operating systems. In the practical part, there is a model of decision situation that turns up when choosing a mobile phone and also when choosing a mobile operating system. There is also compared the state of usage of mobile devices in the Czech Republic and in the world from several aspects, including the comparison of sales of the particular manufacturers and sales of operating systems.
64

Enhancing Security and Usability Features of NFC

Beygo, Ömer Kerem, Eraslan, Cihan January 2009 (has links)
Near Field Communication (NFC) is a short range wireless communication protocol which is primarily intended to be used on mobile phones. Building upon existing infrastructure of RFID, NFC brings simplicity for connection of mobile devices, service initiation, mobile payment and ticketing. However, NFC still remains as a field that number of researches done are limited. The aim of this paper was to provide solutions for the problems of NFC that cause security risks and hurt user experience. To reach this goal we have reviewed the current literature and implemented an NFC application that we have used throughout our user experience tests. This application provides a practical way to store and transfer contact information using NFC. The results of the study indicated that usability and security suffer from lack of user awareness and physical design of the mobile phones.
65

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Varland, Viktor, Karlsson, Mikael January 2008 (has links)
Today’s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users’ integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials. The result of our studies is indecisive; pitched against Certified Wireless USB’s rigorous and robust security measures, implemented on hardware level, Near Field Communication’s lack of any such security implementations shines all the brighter. The real difference can be traced to the philosophy behind the technologies – Certified Wireless USB can be perceived as a complete product, while Near Field Communication bears more resemblance to a tool. In order to safely use a tool, knowledge about its use is required, thus in order to securely use Near Field Communication we propose two solutions; secure channel and secure identification, which developers can implement on a software level. Furthermore, we suggest that the implementation of security should be based on an incremental model where the security measures are scaled up in direct correlation with the sensitivity of the information managed. Our results imply that Near Field Communication does not have the inherent security that it should have in order to be safely and securely integrated into any system as it is. Therefore, measures have to be taken in order to implement this technology securely on a software level. For Certified Wireless USB it implies that nothing further is needed to achieve a secure implementation as the only weakness it displays is against Side Channel attacks, which are so complicated (and require direct access to the system) that we have deemed them unlikely to be attempted.
66

A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS

Imhontu, Eromon Emmanuel, Kumah, Owusu Yaw January 2010 (has links)
The last few years has witnessed a fast growth in technological advancement which has led to the development of several consumer electronic devices for different purposes or functionalities. For convenience and efficiency, there is the need to bring together all the different functionalities of these devices into a single multipurpose device such as mobile phone with the help of NFC (near field communication) technology. The need for NFC technology in mobile devices is fast gaining popularity in some countries, especially with the successes recorded in some of the NFC pilot projects. The NFC enabled mobile device is very intuitive; works with already existing infrastructures (i.e. ISO/IEC 14443 smartcards and it readers), allows for multiple applications, has a high level of security and comes with unique and attractive features, such as the ability to serve as both reader and writer modes, etc. NFC standards are specified by NFC Forum and it has a well organised ecosystem. This thesis is focused on the potentials of NFC and how it is used as a multipurpose device.
67

Enabling Context Awareness in Ambient Environments using Cloud Infrastructures

Zia, Umar January 2011 (has links)
This thesis was prepared in collaboration with Acreo (Research and Development Company) and OpenCare (IT Company). Its purpose was to design and develop a research testbed to enable context awareness in pervasive environments by modifying the MediaSense framework (EU Funded project) of Mid Sweden University. In ubiquitous environments, the proliferation of devices such as sensors, active badges, mobile phones, RFID and NfC tags enables the development of intelligent services towards new forms of pervasive applications. These intelligent services seamlessly gather context information and the benefits offered are in the provision of better services. The inspiration given by these intelligent services has meant that the focus of thesis has been on using these services in a healthcare application. The challenge is that the proposed testbed should address the intelligent delivery of health information to any host, anywhere, based on the user’s context. Further, context reasoning requires substantial computing power and smart devices have limited resources in terms of processing and memory, so, the testbed should enable smart communication to take place between these devices. The proposed solution satisfies the stated requirements by using a cloud infrastructure and a Distributed Context eXchange Protocol (DCXP). Any device on the internet that is DCXP capable may register with the architecture and share context information in an efficient way. In order to view context information, TV, smartphones, internet tablets and web interfaces have been provided for both the user and the health centre. By successfully addressing the requirements of the testbed, this thesis has enabled the creation of a pervasive healthcare application. Hence, this thesis concludes with the observation that the proposed approach for context awareness in a healthcare system has the ability to deal with the stated challenges.
68

Attityd till och användande av ny teknik : Med Near Field Communication som exempel

Erlandsson, Per-Erik, Strid, Gustav January 2013 (has links)
Utgångspunkten för denna uppsats är en förstudie om den trådlösa tekniken Near Field Communication (NFC), som vi författare genomförde via en enkät. Några av svaren på enkäten som berörde ämnet riskbeteende fick oss att undra varför respondenter svarade som de gjorde på vissa frågor, då detta kunde innebära att de tog en risk med personlig information. Detta ledde till att vi ville ta reda på varför och till vilken gräns personer är villiga att ta risker med ny teknik, men även vilka variabler som spelar in i deras beslut att använda eller inte använda ny teknik. Vårt tillvägagångssätt är en litteraturstudie för att förstå vad som menas med användbarhet, riskbeteende och pålitlighet samt hur dessa hänger ihop. Efter att vi bildat oss en uppfattning om dessa och fördjupat oss lite mer inom ämnena, så genomförde vi intervjuer för att se hur den information vi forskat fram förhöll sig till våra respondenter. Urvalet av de personer som intervjuades har varit ”bekvämlighetsurval”, alltså personer i vår närhet.  Resultatet pekar på att det finns en hel del förarbete att genomföra innan man lanserar ny teknik. Dessutom har upplevd pålitlighet till företaget stor betydelse. För att många personer ska ta till sig ny teknik krävs det information och en del tillit till företaget i fråga, detta för att personen ens ska börja använda tekniken.
69

Analýza bezkontaktného platenia. / Analysis of contactless payments

Švantnerová, Romana January 2014 (has links)
The aim of this thesis is to provide a comprehensive view on the issue of contactless payments in various forms, as well as capture the actual situation in the field of contactless payments. The first chapter is devoted to the emergence and development of payment cards as a forerunner of contactless cards. The second chapter characterizes contactless cards as a new payment product. Additionally it also includes a description of the technology, which is used for this kind of cards. Chapter also deals with the arrival of contactless cards to Czech Republic and Slovakia. The topic of third chapter is Near Field Communication, special technology, which is used for contactless payments and also for the other forms of contactless payments, such as mobile payments. The fourth chapter talks about mobile services that are actually used for mobile payments. These services are not available in our region yet, but we expect their further expansion into European countries in the future. Finally, the last chapter includes an analysis of data, where we used statistical data of contactless payments in Slovakia and Czech Republic. The aim was to outline the development of contactless payments in individual quarters in both countries separately and to compare the data of contactless cards and payments in these countries.
70

Shopal : Utforskning av applikationer för det digitala jaget på den fysiska världen

Meijer, Felix January 2017 (has links)
This project aimed to explore how payments and identification might be moved from traditional wallets and implemented into a smart wearable.The thesis was that this would be doable through the use of NFC (Near Field Communication), IoT (Internet of Things) and Cloud-based services.Research was made by collecting data through questionnaires, local workshops, bodystorming and looking into online literature and articles on the subject of future consumer trends, wearable technology and biometric systems, security concerning wireless payments and identification as well as trend analysis articles concerning the Digital Self - also known as the Exoself - which came to have a major impact on the direction the project took. Through ideation five concepts concerning services and products using a person’s Digital Self were formed and evaluated with workshops. This eventually led to a concept called Shopal being decided as the endgame of the project. Shopal was a service which filtered the user’s information within the Digital Self to make shopping decisions easier, by learning what the user wants to know about certain types of products, then aiming to deliver said information. This service was called AIA (Artificial Intelligence Assistant). The second outcome of the Shopal concept was the AHW (At-Hand-Wearable) collection named SIGIL, which works as a means to extend AIA:s perception to what the user touches and interacts with, allowing it to gather information about the product, then delivering it through the physical AHW to the user.

Page generated in 0.0206 seconds