Proposal for Off Site Storage
Library Management System
MutaDATABASE
The Outer Limits of RFID Security
RFID Security: In the Shoulder and on the - RSA, The Security ...
DMI: duPont Manual Interactive Application for the Jim Dillmann Award.
Peer-to-peer and agent-based computing Agents & Multi-Agent Systems: Introduction (Contd)
RFID: Technology and Applications. Outline Overview of RFID Reader-Tag; Potential applications RFID Technology Internals RF communications Reader/Tag.
Do You Write Secure Code? by Erez Metula
Rfid library Management
Identity 2.0 - OpenID And User Centric Identity