{"id":420197,"date":"2024-10-20T06:29:53","date_gmt":"2024-10-20T06:29:53","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-tr-166702014-3\/"},"modified":"2024-10-26T12:09:00","modified_gmt":"2024-10-26T12:09:00","slug":"bsi-pd-cen-tr-166702014-3","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-tr-166702014-3\/","title":{"rendered":"BSI PD CEN\/TR 16670:2014"},"content":{"rendered":"

The scope of the Technical Report is to consider the threats and vulnerabilities associated with specific characteristics of RFID technology in a system comprising:<\/p>\n