![Photo](/media/story/85650/rect-01-pcs02-gsm0410-web.jpg)
17.05.2010 • Topstories • Management
Security in RFID-based Personnel Identification
It is well known that every security method has its limits and that the effort required to crack a security pass or a transponder in an RF-based (Radio Frequency) identification sy...