
17.05.2010 • Topstories • Management
Security in RFID-based Personnel Identification
It is well known that every security method has its limits and that the effort required to crack a security pass or a transponder in an RF-based (Radio Frequency) identification sy...