This documents deals with dependability issues of aggregated objects and RFID-based systems. It analyses the dierent categories of issues raised by these objects and proposes some measures to face them. It also provides a state of the art of actual implementations of those solutions with multiple comparisons.Ce document expose les différents aspects liés èa la sûreté de fonctionnement d'applications s'appuyant sur les objets physiques aggrégés et la technologie RFID. Il expose les différentes catégories de problèemes susceptibles de compromettre le service et propose des solutions adaptées
La technologie « Radio Frequency Identification (RFID) » est devenue de plus en plus répandue dans l...
This paper surveys consistency criteria that have been proposed and sometimes implemented, for share...
International audienceIntegrity checking is important in many activities, such as logistics, telecom...
This documents deals with dependability issues of aggregated objects and RFID-based systems. It anal...
International audienceRFID-enabled security solutions are becoming ubiquitous; for example in access...
On assiste de nos jours à une utilisation croissante des systèmes RFID (Radio Frequency IDentificati...
AbstractIntegrity checking is important in many activities, such as logistics, telecommunications or...
Numeric identifiers are converging, whatsoever their use: supported on hardware technologies (such a...
Pervasive computing or ambient computing aims to integrate information systems into the environment,...
Selon le concept de l'Internet des Objets (IoT), chaque objet manufacturé se voit attribuer un ident...
We are witnessing today a growing use of RFID (Radio Frequency IDentification) systems in various ap...
International audienceWhile RFID technology is gaining increased attention from industrial community...
Les principales contributions de cette thèse sont au nombre de trois. La première partie de cette th...
Internet applications require more and more resources to satisfy the unpredictable clients needs. Sp...
La technologie « Radio Frequency Identification (RFID) » est devenue de plus en plus répandue dans l...
This paper surveys consistency criteria that have been proposed and sometimes implemented, for share...
International audienceIntegrity checking is important in many activities, such as logistics, telecom...
This documents deals with dependability issues of aggregated objects and RFID-based systems. It anal...
International audienceRFID-enabled security solutions are becoming ubiquitous; for example in access...
On assiste de nos jours à une utilisation croissante des systèmes RFID (Radio Frequency IDentificati...
AbstractIntegrity checking is important in many activities, such as logistics, telecommunications or...
Numeric identifiers are converging, whatsoever their use: supported on hardware technologies (such a...
Pervasive computing or ambient computing aims to integrate information systems into the environment,...
Selon le concept de l'Internet des Objets (IoT), chaque objet manufacturé se voit attribuer un ident...
We are witnessing today a growing use of RFID (Radio Frequency IDentification) systems in various ap...
International audienceWhile RFID technology is gaining increased attention from industrial community...
Les principales contributions de cette thèse sont au nombre de trois. La première partie de cette th...
Internet applications require more and more resources to satisfy the unpredictable clients needs. Sp...
La technologie « Radio Frequency Identification (RFID) » est devenue de plus en plus répandue dans l...
This paper surveys consistency criteria that have been proposed and sometimes implemented, for share...
International audienceIntegrity checking is important in many activities, such as logistics, telecom...