• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 293
  • 103
  • 94
  • 78
  • 68
  • 55
  • 21
  • 18
  • 18
  • 15
  • 13
  • 9
  • 7
  • 7
  • 5
  • Tagged with
  • 881
  • 161
  • 142
  • 133
  • 126
  • 103
  • 91
  • 79
  • 72
  • 71
  • 70
  • 66
  • 63
  • 62
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Sécurité et protection de la vie privée dans les systèmes RFID / Security and privacy in RFID systems

Elkhiyaoui, Kaoutar 12 September 2012 (has links)
Vu que les tags RFID sont actuellement en phase de large déploiement dans le cadre de plusieurs applications (comme les paiements automatiques, le contrôle d'accès à distance, et la gestion des chaînes d’approvisionnement), il est important de concevoir des protocoles de sécurité garantissant la protection de la vie privée des détenteurs de tags RFID. Or, la conception de ces protocoles est régie par les limitations en termes de puissance et de calcul de la technologie RFID, et par les modèles de sécurité qui sont à notre avis trop forts pour des systèmes aussi contraints que les tags RFID. De ce fait, on limite dans cette thèse le modèle de sécurité; en particulier, un adversaire ne peut pas observer toutes les interactions entre tags et lecteurs. Cette restriction est réaliste notamment dans le contexte de la gestion des chaînes d’approvisionnement qui est l’application cible de ce travail. Sous cette hypothèse, on présente quatre protocoles cryptographiques assurant une meilleure collaboration entre les différents partenaires de la chaîne d’approvisionnement. D’abord, on propose un protocole de transfert de propriété des tags RFID, qui garantit l’authentification des tags en temps constant alors que les tags implémentent uniquement des algorithmes symétriques, et qui permet de vérifier l'authenticité de l’origine des tags. Ensuite, on aborde le problème d'authenticité des produits en introduisant deux protocoles de sécurité qui permettent à un ensemble de vérificateurs de vérifier que des tags “sans capacité de calcul” ont emprunté des chemins valides dans la chaîne d’approvisionnement. Le dernier résultat présenté dans cette thèse est un protocole d’appariement d’objets utilisant des tags “sans capacité de calcul”, qui vise l’automatisation des inspections de sécurité dans la chaîne d’approvisionnement lors du transport des produits dangereux. Les protocoles introduits dans cette thèse utilisent les courbes elliptiques et les couplages bilinéaires qui permettent la construction des algorithmes de signature et de chiffrement efficaces, et qui minimisent donc le stockage et le calcul dans les systèmes RFID. De plus, la sécurité de ces protocoles est démontrée sous des modèles formels bien définis qui prennent en compte les limitations et les contraintes des tags RFID, et les exigences strictes en termes de sécurité et de la protection de la vie privée des chaines d’approvisionnement. / While RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to produ ct cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tags, and by the formalizations of RFID privacy that are believed to be too strong for such constrained devices. It follows that most of the existing RFID-based cryptographic schemes failed at ensuring tag privacy without sacrificing RFID scalability or RFID cost effectiveness. In this thesis, we therefore relax the existing definitions of tag privacy to bridge the gap between RFID privacy in theory and RFID privacy in practice, by assuming that an adversary cannot continuously monitor tags. Under this assumption, we are able to design sec ure and privacy preserving multi-party protocols for RFID-enabled supply chains. Namely, we propose a protocol for tag ownership transfer that features constant-time authentication while tags are only required to compute hash functions. Then, we tackle the problem of product genuineness verification by introducing two protocols for product tracking in the supply chain that rely on storage only tags. Finally, we present a solution for item matching that uses storage only tags and aims at the automation of safety inspections in the supply chain.The protocols presented in this manuscript rely on operations performed in subgroups of elliptic curves that allow for the construction of short encryptions and signatures, resulting in minimal storage requirements for RFID tags. Moreover, the privacy and the security of these protocols are proven under well defined formal models that take into account the computational limitations of RFID technology and the stringent privacy and security requirements of each targeted supply chain application.
22

Real time locating system based on active RFID

Pereira, Paulo Jorge Gomes January 2011 (has links)
Tese de mestrado integrado. Engenharia Electrotécnica e de Computadores (Telecomunicações). Universidade do Porto. Faculdade de Engenharia. 2011
23

Production Control &=and Logistics

Correia, Pedro Osvaldo Oliveira Loureiro dos Santos January 2008 (has links)
Estágio realizado na Faurecia - Assentos de Automóvel, Ld.ª e orientado pelo Eng.ª Alexandra Ferrão / Tese de mestrado integrado. Engenharia Industrial e Gestão. Faculdade de Engenharia. Universidade do Porto. 2008
24

Déploiement de la technologie RFID pour de nouveaux usages dans les industries du commerce / Deployment of the RFID technology for new uses in the retail industries

Anssens, Charles 13 June 2012 (has links)
Aujourd’hui personne n’est capable de garantir le 100% de taux de lecture d’objets à identifier sous un portique, la tendance est d’augmenter la puissance d’émission pour être certains d’envoyer assez d’énergie pour téléalimenter tous les tags passant sous un portique. Cependant la puissance émise devient suffisante pour lire les tags du portique adjacent, c’est le phénomène de lectures croisées. Pour s’affranchir de ce problème nous avons développé une technique de synchronisation des lectures RFID visant à maximiser le taux de lecture et à corriger les lectures croisées. Dans le cadre de ma thèse je me suis orienté vers une architecture basée sur l’inventaire temps réel et couvrant toute la surface d’un entrepôt et non plus seulement les entrées et sorties. Pour mettre en place cette architecture il faut un maillage de lecteurs RFID et ceux-ci doivent être communicants. Nous réalisons donc un réseau de capteurs RFID qui permet une traçabilité plus fine, des inventaires temps réel et de nouveaux services tel que la localisation d’articles. Nous avons pu réaliser des prototypes fonctionnels de réseau de capteurs RFID dans la bande UHF (868MHz). Obtenir un taux de lecture à 100% est complexe à obtenir car les conditions d’environnements varient. De nombreux facteurs influent sur les performances. Un de ces facteurs est le phénomène d’évanouissements d’ondes sélectifs. D’où le besoin de développer des antennes qui modifient leur rayonnement afin de déplacer les évanouissements et ainsi s’assurer de couvrir 100% de l’espace en lecture RFID. / The rise of the internet of things will allow for the retail sector new opportunities of development. To access to this technology it remains a lot of technical challenges. Currently in the warehouses equipped with RFID there is a trade off between radiated power which determines the ability to read 100% of the targeted tag’s population and the quality of the information. To ensure a 100% of reading of this population the risk is to read others tags, in another tag population: the adjacent portal or in the warehouse stock. The RFID in warehouse has to improve the information quality to get a rise of deployment in industry. Our goal is to improve the efficiency in stock management for warehouses or retail stores by correcting the cross readings. We decided to consider the implementation of a RFID sensor network. This technology is based on a network of nodes in which each node collects data of its environment. By placing the nodes and meshing the surface it is now possible to cover a space. First we will explain the context and the standards of RFID for the retail. Then we will present a sensor network system design to make the inventory of items. Finally we will examine the optimization for the retail environment. The environment conditions impact on the reading rate, many parameters from the environment impact on the performance. The multi-path effect decreases the reading rate specialy in a RFID sensor network where all elements are static. The main solution is to use antenna array to get diversity in the radiation field and to get a high reading rate.
25

Potential of mobile devices in New Zealand healthcare : a thesis submitted to the faculty of Massey University at Albany in partial fulfilment of the requirements for the degree of Masters of Engineering in Software

Mirza, Asfahaanullah Baig January 2008 (has links)
This thesis examines the potential for the use of mobile devices in New Zealand healthcare. Adoption of mobile technology can potentially improve information access at point of care, increase efficiency and patient safety, significantly reduce costs, enhance workflow, and promote evidence-based practice to help make effective decisions. Mobile devices of different size and form such as laptops, tablet PCs, PDAs, smart phones, mobile phones, and RFID offer portability, remote access to clinical data, traceability, convergence, and connectivity which traditional computers cannot emulate. The pervasiveness of mobile devices is increasing both globally and within New Zealand. The potential of mobile technology in healthcare has been recognized by many developed countries; there is adequate evidence for improving productivity, efficiency, and patient engagement. The study focuses on the three prominent healthcare sectors in New Zealand: Primary, Secondary, and Community. As mobile technology is still an underdeveloped area within New Zealand’s healthcare industry, the use of a qualitative research approach involving surveys and interviews helps to determine which m-health applications are most appropriate to adopt here. The sample surveyed consists of health providers, health strategists, and technology vendors. The potential of mobile devices that were identified from the interviews included real-time access to information such as clinical data, drug database, and medical references. the use of SMS reminders and alerts, use of RFID to reduce medical errors, manage patients and assets, and for identification of medical equipment and drug identification. Over 80 percent of the participants considered privacy, confidentiality, and security to be very important challenges in the m-health domain. Many challenges and implications were identified, including technical constraints such as form factor of mobile devices, storage space, limited battery life, durability, and reading distance of RFID devices. Privacy, security, and ethical issues were discussed including the sensitivity of personal data, sending and receiving of clinical data, RFID tracking ability, security, and encryption standards, authentication barriers, and cultural barriers.
26

Implementation Study of IEEE 802 : 15.4

Hussain, Assad, Kazim Hafeez, Muhammad January 2006 (has links)
<p>This thesis is analysis-based survey in which our task was to find out the suitability of </p><p>IEEE 802.15.4 for the RFID systems in terms of power. We studied the different RFID </p><p>systems. We analyzed the IEEE 802.15.4 to see how much this protocol can facilitate the </p><p>RFID application, but we just considered the 2.4 GHz physical band as Free2move uses </p><p>this band for its RFID products. Since semi-passive1 RFIDs are the closest competitors </p><p>of the active RFID, so we also compared the IEEE 802.15.4 with ISO 18000-4 (mode2) </p><p>to find out their pros and cons. </p><p>We also tried to evaluate the hardware architecture proposed by Free2move. We </p><p>compared proposed hardware components with other competitors available in the market. </p><p>The main point of focus during hardware evaluation remained its power efficiency. As </p><p>concluding part we have proposed an idea for using the IEEE 802.15.4 standard in semi- </p><p>passive RFIDs.</p>
27

Radiofrekvensidentifiering (RFID) : Vilka faktorer påverkar utvecklingen negativt?

Karlsson, Anders, Bengtsson, Mattias January 2006 (has links)
<p>Radiofrekvensidentifiering (RFID) är en teknik som har funnits en längre tid men aldrig fått något riktigt genombrott på marknaden. Intresset för tekniken finns, men användandet har inte tagit fart. Anledningen till detta examensarbete är att ta reda på vad detta beror på.</p><p>Uppsatsen har två syften där huvudsyftet är att undersöka vilka faktorer som har påverkat utvecklingen av RFID negativt, därefter ett bisyfte som är att undersöka hur framtiden för RFID ser ut.</p><p>Undersökningen genomförs med hjälp av litteratur samt intervjuer av två respondenter, som använder sig av RFID i sitt arbete. Den ena respondenten utvecklar RFID lösningar till andra företag, medan den andra respondenten arbetar som forskare. För att komma fram till en slutsats jämför vi litteratur med de uppgifter som kommit fram genom intervjuerna. På detta sätt identifieras ett antal faktorer, som bromsar utvecklingen av RFID.</p><p>De faktorer som framkommer delar vi in i marknadsfaktorer och tekniska faktorer. Marknadsfaktorerna är ointresse för tekniken, otillräckliga nätverkseffekter samt en långsam adoption av tekniken. Tekniska faktorer är kostnad, brist på gemensam standard, svårigheter i frekvensval samt säkerhetsaspekter.</p>
28

RFID : a catalyst for supply chain performance

Lakshmanan, Alagendran January 2009 (has links)
THE ADVANTAGE OF RFID TECHNOLOGY IMPLEMENTATION IN A MANUFACTURING FIRM. THE TECHNOLOGY IMPLEMENTATION STREAM LINES THE LOSS OF INFORMATION FLOW WHEN THE PRODUCT MOVES ALONG THE DIFFERENT CHAIN MEMBERS. THE COMMON SHARING OF THE ASSOCIATED BENEFIT BRINGS HIGHER PROCESS EFFICEINCY , WHEN THE PRODUCT MOVES ALONG THE UPSTREAM AND DOWNSTREAM SUPPLY CHAIN FOR THE SELECTED PRODUCT. THE IMPLEMENTATION IS A CUSTOMISED SOLUTION FOR THE MANUFACTURING UNIT FOR ITS PRODUCT, THIS THESIS WILL ENABLE THE IMPLEMENTATORS THE VALUABLE IMPLEMENTATION PROCEDURES THAT ONE HAS TO FOLLOW TO TAKE RIGHT BENEFIT FROM THIS TECHNOLOGY.
29

none

Ou, Tzu-ching 30 July 2007 (has links)
none
30

Förenklad felinformation på trafikinformationsutrustning

Granbom, Markus January 2013 (has links)
This thesis lays the foundation of the future routines of effective error repotring fortraffic devices in the raiway sector.If a device, for example a timetable display, stops working it is vital that the device isfixed as fast as possible so that the travelers dont miss any important information.The methods that are used today are old and not very effective. It can take time forthe repairmen to find the right device or locating the broken component. At the sametime he is supposed to maintain telephone contact with central control throughoutthe whole session.The need for a new, more effective, system is vital to make the whole repair pfocessmore effective and let the repairmen work without having to contact the centralcontrol by phone.I started this work by examining the possibilities of assigning every object with aunique identifier (ID tag) that could be accessed by a manual scan device. The ideawas that the ID tag could holw information about the object and be obtained byscanning the ID and get the information presented on a mobile device.The work also included building a internet application that enabled the reader to seeand change the information on the ID tag.The result was a database that stored information of different objects which could beobtained by scanning the ID tag and presented by a internet application.

Page generated in 0.0354 seconds