Apr 10, 2019As RFID and BLE technology is increasingly adopted across a number of scenarios, it turns out that a number of these use cases require a higher level of security. The tags and the affixed items must stay together and that identification tag or sensor cannot be cloned. This session will describe several physical, cryptographic and RFID aspects of implementing tamper evidence in RFID tags and describe related real-life implementations. Speaker: Richard...
To continue reading this article, please log in or choose a purchase option.
Option 1: Become a Premium Member.
One-year subscription, unlimited access to Premium Content: $189
Gain access to all of our premium content and receive 10% off RFID Reports and RFID Events!
UPGRADE NOW, AND YOU'LL GET IMMEDIATE ACCESS TO:
- Case Studies
Our in-dept case-study articles show you, step by step, how early adopters assessed the business case for an application, piloted it and rolled out the technology.
Free Sample: How Cognizant Cut Costs by Deploying RFID to Track IT Assets
- Best Practices
The best way to avoid pitfalls is to know what best practices early adopters have already established. Our best practices have helped hundreds of companies do just that.
- How-To Articles
Don’t waste time trying to figure out how to RFID-enable a forklift, or deciding whether to use fixed or mobile readers. Our how-to articles provide practical advice and reliable answers to many implementation questions.
These informative articles focus on adoption issues, standards and other important trends in the RFID industry.
Free Sample: Europe Is Rolling Out RFID
- Magazine Articles
All RFID Journal Premium Subscribers receive our bimonthly RFID Journal print magazine at no extra cost, and also have access to the complete online archive of magazine articles from past years.
Become a member today!