-
1
-
-
30944443564
-
A secure mobile track and trace system for anti-counterfeiting
-
Hong Kong, March 29-April 1
-
P. Lei, F. Claret-Tournier, C. Chatwin, and R. Young A secure mobile track and trace system for anti-counterfeiting Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service Hong Kong, March 29-April 1 2005 686 689
-
(2005)
Proceedings of the 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service
, pp. 686-689
-
-
Lei, P.1
Claret-Tournier, F.2
Chatwin, C.3
Young, R.4
-
2
-
-
77955413377
-
-
ICC Counterfeiting Intelligence Bureau ICC Commercial Crime Services
-
ICC Counterfeiting Intelligence Bureau ICC Handbook 2005 ICC Commercial Crime Services
-
(2005)
ICC Handbook
-
-
-
4
-
-
0036505144
-
Next generation technologies to combat counterfeiting of electronic components
-
S. Bastia Next generation technologies to combat counterfeiting of electronic components IEEE Transactions on Components and Packaging Technologies 25 1 2002 175 176
-
(2002)
IEEE Transactions on Components and Packaging Technologies
, vol.25
, Issue.1
, pp. 175-176
-
-
Bastia, S.1
-
5
-
-
77955413056
-
-
International Chamber of Commerce Commercial Crime Services International Chamber of Commerce Counterfeiting Intelligence Bureau
-
International Chamber of Commerce Commercial Crime Services International Guide to IP Rights Enforcement First Edition 2006 2006 International Chamber of Commerce Counterfeiting Intelligence Bureau
-
(2006)
International Guide to IP Rights Enforcement First Edition 2006
-
-
-
6
-
-
77955419426
-
-
ICC Counterfeiting Intelligence Bureau ICC Commercial Crime Services
-
ICC Counterfeiting Intelligence Bureau The International Anti-counterfeiting Directory 2008 ICC Commercial Crime Services
-
(2008)
The International Anti-counterfeiting Directory
-
-
-
8
-
-
77955416349
-
-
ICC Counterfeiting Intelligence Bureau ICC Commercial Crime Services
-
ICC Counterfeiting Intelligence Bureau Anti-Counterfeiting Technology Guide 2005 ICC Commercial Crime Services
-
(2005)
Anti-Counterfeiting Technology Guide
-
-
-
10
-
-
79961019377
-
An intelligent RFID-based electronic anti-counterfeit system (InRECS) for the manufacturing industry
-
Seoul, Korea, July 6-11
-
S.K. Kwok, A.H.C. Tsang, J.S.L. Ting, W.B. Lee, and B.C.F. Cheung An intelligent RFID-based electronic anti-counterfeit system (InRECS) for the manufacturing industry Proceedings of the 17th International Federation of Automatic Control (IFAC) World Congress 2008 Seoul, Korea, July 6-11 2008 5482 5487
-
(2008)
Proceedings of the 17th International Federation of Automatic Control (IFAC) World Congress 2008
, pp. 5482-5487
-
-
Kwok, S.K.1
Tsang, A.H.C.2
Ting, J.S.L.3
Lee, W.B.4
Cheung, B.C.F.5
-
12
-
-
77955431169
-
Pharmaceutical counterfeiting: Fears into facts
-
Reconnaissance International
-
Reconnaissance International Pharmaceutical counterfeiting: fears into facts Authentication News 8 7 2002 1
-
(2002)
Authentication News
, vol.8
, Issue.7
, pp. 1
-
-
-
14
-
-
21744453249
-
-
Food and Administration
-
U.S. Department of Health and Human Services Combating Counterfeit Drugs 2004 Food and Administration
-
(2004)
Combating Counterfeit Drugs
-
-
-
15
-
-
0141589474
-
Imitating property is theft
-
Imitating property is theft The Economist May 2003 52 54
-
(2003)
The Economist
, Issue.MAY
, pp. 52-54
-
-
-
18
-
-
5444256863
-
Securing the pharmaceutical supply chain
-
Massachusetts Institute of Technology
-
R. Koh, E. Schuster, I. Chackrabarti, A. Bellman, Securing the pharmaceutical supply chain, in: White Paper, Auto-ID Labs, Massachusetts Institute of Technology, 2003.
-
(2003)
White Paper, Auto-ID Labs
-
-
Koh, R.1
Schuster, E.2
Chackrabarti, I.3
Bellman, A.4
-
19
-
-
35248832722
-
Squealing Euros: Privacy protection in RFID-enabled banknotes
-
Le Gosier, Guadeloupe, French, West Indies
-
A. Juels, and R. Pappu Squealing Euros: privacy protection in RFID-enabled banknotes Proceedings of Financial Cryptography-FC"03 Le Gosier, Guadeloupe, French, West Indies 2003 103 121
-
(2003)
Proceedings of Financial Cryptography-FC"03
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
22
-
-
36248949547
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
Hiroshima, Japan, January 17-20
-
D.N. Duc, J. Park, H. Lee, and K. Kim Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning Proceedings of the 2006 Symposium on Cryptography and Information Security Hiroshima, Japan, January 17-20 2006
-
(2006)
Proceedings of the 2006 Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
23
-
-
33645857377
-
Cryptography and authentication on RFID passive tags for apparel products
-
K.H.M. Wong, P.C.L. Hui, and A.C.K. Chan Cryptography and authentication on RFID passive tags for apparel products Computers in Industry 57 4 2006 342 349
-
(2006)
Computers in Industry
, vol.57
, Issue.4
, pp. 342-349
-
-
Wong, K.H.M.1
Hui, P.C.L.2
Chan, A.C.K.3
-
24
-
-
44049095692
-
-
Bachelor's Thesis, School of Computing, University of Tasmania, November
-
L.T. Mirowski, Detecting clone radio frequency identification tags, Bachelor's Thesis, School of Computing, University of Tasmania, November, 2006.
-
(2006)
Detecting Clone Radio Frequency Identification Tags
-
-
Mirowski, L.T.1
-
27
-
-
33749346563
-
-
Pearson plc Upper Saddle River, NJ
-
S. Lahiri RFID Sourcebook 2006 Pearson plc Upper Saddle River, NJ
-
(2006)
RFID Sourcebook
-
-
Lahiri, S.1
-
28
-
-
77955416882
-
-
EPCglobal, Inc.
-
EPCglobal, Inc. RFID Implementation Cookbook 2006 Available at: http://www.epcglobalinc.org/what/cookbook
-
(2006)
RFID Implementation Cookbook
-
-
-
30
-
-
33744729631
-
Recent developments in cryptographic hash functions: Security implications and future directions
-
C. Cid Recent developments in cryptographic hash functions: security implications and future directions Information Security Technical Report 11 2 2006 100 107
-
(2006)
Information Security Technical Report
, vol.11
, Issue.2
, pp. 100-107
-
-
Cid, C.1
-
31
-
-
60249090067
-
Roadmap to tracking based business and intelligent products
-
J. Holmström, R. Kajosaari, K. Främling, and E. Langius Roadmap to tracking based business and intelligent products Computers in Industry 60 3 2009 229 233
-
(2009)
Computers in Industry
, vol.60
, Issue.3
, pp. 229-233
-
-
Holmström, J.1
Kajosaari, R.2
Främling, K.3
Langius, E.4
-
32
-
-
77955427575
-
A RFID EPC C1 Gen2 system with channel coding capability in AWGN noise environments
-
K.Y. Jeon, and S.H. Cho A RFID EPC C1 Gen2 system with channel coding capability in AWGN noise environments IEICE Transactions on Communications E92-B 2 2009 608 611
-
(2009)
IEICE Transactions on Communications
, vol.92
, Issue.2
, pp. 608-611
-
-
Jeon, K.Y.1
Cho, S.H.2
-
33
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
H.Y. Chien, and C.H. Chen Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computer Standards and Interfaces 29 2 2007 254 259
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
34
-
-
39749100579
-
RFID research: An academic literature review (1995-2005) and future research directions
-
E.W.T. Ngai, K.K.L. Moon, F.J. Riggins, and C.Y. Yi RFID research: an academic literature review (1995-2005) and future research directions International Journal of Production Economics 112 2 2008 510 520
-
(2008)
International Journal of Production Economics
, vol.112
, Issue.2
, pp. 510-520
-
-
Ngai, E.W.T.1
Moon, K.K.L.2
Riggins, F.J.3
Yi, C.Y.4
-
36
-
-
24644498485
-
RFID: A technical overview and its application to the enterprise
-
R. Weinstein RFID: a technical overview and its application to the enterprise IT Professional 7 3 2005 27 33
-
(2005)
IT Professional
, vol.7
, Issue.3
, pp. 27-33
-
-
Weinstein, R.1
-
38
-
-
68949181328
-
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
-
E.Y. Choi, D.H. Lee, and J.I. Lim Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems Computer Standards and Interfaces 31 6 2009 1124 1130
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1124-1130
-
-
Choi, E.Y.1
Lee, D.H.2
Lim, J.I.3
|