Sponsored by ComputerWeekly.com
UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited Access >>>
Table of contents
- RFID technology as a security enabler in the Internet of Things
- A generic tracking and identification scenario
- TRAP-2.5 as a principal security component of the system
Premium Content for Free.
More Premium Content Accessible For Free
A guide to storage and virtualisation
Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key ...
Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.
Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation...