• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 598
  • 80
  • 60
  • 25
  • 24
  • 13
  • 10
  • 10
  • 9
  • 9
  • 7
  • 7
  • 7
  • 7
  • 7
  • Tagged with
  • 1028
  • 1028
  • 311
  • 276
  • 178
  • 155
  • 150
  • 142
  • 124
  • 120
  • 104
  • 101
  • 101
  • 100
  • 85
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Next Generation RFID Randomization Protocol

LaValley, Jason 06 December 2011 (has links)
Radio Frequency IDentification (RFID) is a wireless communications technology which allows companies to secure their assets and increase the portability of information. This research was motivated by the increased commercial use of RFID technology. Existing security protocols with high levels of security have high computation requirements, and less intensive protocols can allow a tag to be tracked. The techniques proposed in this thesis result in the increase of ciphertexts available without a significant increase in processing power or storage requirements. The addition of random inputs to the generation of ciphertexts will increase the number of possible results without requiring a more advanced encryption algorithm or an increased number of stored encryption keys. Four methods of altering the plaintext/ciphertext pair (random block, set pattern, random pattern, and indexed placement) are analyzed to determine the effectiveness of each method. The number of ciphertexts generated, generation time, and generation errors were recorded to determine which of the four proposed methods would be the most beneficial in a RFID system. The comparison of these method characteristics determined that the set pattern placement method provided the best solution. The thesis also discusses how RFID transmissions appear to attackers and explains how the random inputs reduce effectiveness of current system attacks. In addition to improving the anonymity of RFID tag transmissions, the concept of authenticating random inputs is also introduced in this thesis. These methods help prevent an adversary from easily associating a tag with its transmissions, thus increasing the security of the RFID system.
102

Next Generation RFID Randomization Protocol

LaValley, Jason 06 December 2011 (has links)
Radio Frequency IDentification (RFID) is a wireless communications technology which allows companies to secure their assets and increase the portability of information. This research was motivated by the increased commercial use of RFID technology. Existing security protocols with high levels of security have high computation requirements, and less intensive protocols can allow a tag to be tracked. The techniques proposed in this thesis result in the increase of ciphertexts available without a significant increase in processing power or storage requirements. The addition of random inputs to the generation of ciphertexts will increase the number of possible results without requiring a more advanced encryption algorithm or an increased number of stored encryption keys. Four methods of altering the plaintext/ciphertext pair (random block, set pattern, random pattern, and indexed placement) are analyzed to determine the effectiveness of each method. The number of ciphertexts generated, generation time, and generation errors were recorded to determine which of the four proposed methods would be the most beneficial in a RFID system. The comparison of these method characteristics determined that the set pattern placement method provided the best solution. The thesis also discusses how RFID transmissions appear to attackers and explains how the random inputs reduce effectiveness of current system attacks. In addition to improving the anonymity of RFID tag transmissions, the concept of authenticating random inputs is also introduced in this thesis. These methods help prevent an adversary from easily associating a tag with its transmissions, thus increasing the security of the RFID system.
103

RFIDs användning i produktionsprocesser : en studie bland operatörer på Lear Corporation

Andersson, Jessica, Larsson, Stina, Jendesand, Gunilla January 2005 (has links)
No description available.
104

Design of Antennas for Radio Frequency Identification and Analysis of Power Coupling Effects

Wang, Pai-Chieh 25 July 2005 (has links)
In this paper, we propose tag antennas and reader antennas, which are suitable for radio frequency identification system. Antennas operating in the ISM and the UHF bands are designed. The antenna dimensions are minimized by employing the meander-line technology. Adopting the concepts of Yagi-Uda antennas, We use parasites to increase the antenna gain and to create an end-fire radiation pattern. The fact that the design comes without a ground plane can achieve cost down of the antenna. Higher antenna gains allow a greater effective read-zone distance. Also, the directional radiation pattern eliminates the degradation of performance due to multi-path loss. The design of tag antennas shows good performances in terms of both cost and antenna characteristics for radio frequency identification systems. The reader antennas are designed. Etching a slit in a square patch can achieve the requirement of circular polarization. It can effectively reduce the polarization mismatch when the tags are point to different orientation. Therefore the reliability of system operation will be improved. The antenna performance is measured by the experiments. Moreover, it will be compared with the simulation. In the latter part of paper, the simulation of the power coupling will be carried out. According to the result of power coupling simulation, we analyze and discuss which factor will affect the reliability of the identification. Identification failure will be effectively avoided and a robust identification system can be built if the analyses are properly employed.
105

Modeling and Evaluating Lead-frame CSPs for Radio-Frequency Integrated Circuit Applications

Huang, Hui-Hsiang 30 June 2001 (has links)
­^¤åºK­n¡G In this thesis, a two-step de-embedded techniques was applied to measure the important parameters, ft and fmax , of the heterojunction bipolar transistors(HBTs). The same technique was also used to measure the wide-band S parameters for modeling and evaluating the bump chip carrier(BCC) packages. In the simulation, the Ansoft HFSS simulator was used to calculate the insertion and return losses for some bare and packaged test chips. Comparison between simulated and measured results has been discussed in detail to illustrate the applicability of the HFSS simulator.
106

A self-calibrated, reconfigurable RF LNA /

Jayaraman, Karthik. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2010. / Printout. Includes bibliographical references (leaves 68-70). Also available on the World Wide Web.
107

The electrical properties of human tissue for the diagnosis and treatment of melanoma skin cancer a thesis /

Stante, Glenn Cameron. Laiho, Lily H., January 1900 (has links)
Thesis (M.S.)--California Polytechnic State University, 2009. / Mode of access: Internet. Title from PDF title page; viewed on Jan. 7, 2010. Major professor: Dr. Lily Laiho. "Presented to the faculty of California Polytechnic State University, San Luis Obispo." "In partial fulfillment of the requirements for the degree [of] Master of Science in Biomedical Engineering." "December, 2009." Includes bibliographical references (p. 113-115).
108

Bandwidth-efficient pilot-symbol-aided techniques for fading estimation in multipath fading channels

Ng, Man-hung. January 2001 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2001. / Includes bibliographical references (leaves 203-208).
109

Object localization using passive RFID tags

Jayaraman, Ramprabhu, January 2009 (has links)
Thesis (M.S.)--Rutgers University, 2009. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 69-70).
110

Multitaper spectrum based detection for spectrum sensing in cognitive radio networks /

Wang, Jun. January 2009 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2009. / "Submitted to Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 66-74)

Page generated in 0.0537 seconds