Apr 10, 2019As RFID and BLE technology is increasingly adopted across a number of scenarios, it turns out that a number of these use cases require a higher level of security. The tags and the affixed items must stay together and that identification tag or sensor cannot be cloned. This session will describe several physical, cryptographic and RFID aspects of implementing tamper evidence in RFID tags and describe related real-life implementations. Speaker: Richard...
PREMIUM
THIS RECORDING OR VIDEO IS AVAILABLE TO PREMIUM MEMBERS. PLEASE LOG IN TO VIEW IT. IF YOU ARE NOT CURRENTLY A PREMIUM MEMBER, PLEASE CLICK HERE TO SIGN UP
