Sponsored by ComputerWeekly.com
UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited Access >>>
Table of contents
- RFID technology as a security enabler in the Internet of Things
- A generic tracking and identification scenario
- TRAP-2.5 as a principal security component of the system
Premium Content for Free.
More Premium Content Accessible For Free
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years ...
No more excuses: VDI is ready!
There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly ...
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel ...