How can I test and implement a new RFID authentication protocol by using simulation software only?
I don’t know if or how this can be done. Perhaps one of our readers might have some suggestions for you. If so, they are invited to post them below.
—Mark Roberti, Founder and Editor, RFID Journal
Can a Leaky Feeder Be Used With an RFID System? »