-
1
-
-
79951858108
-
-
Available
-
Glaxo-Smith-Kline. 2009, Counterfeiting Report. Available: http://www.gsk.com/responsibility/supply-chain/counterfeiting.htm
-
(2009)
Counterfeiting Report
-
-
-
2
-
-
79951854742
-
-
Available
-
B. S. Alliance. 2009, Seventh Annual Global Software Piracy Study. Available: http://portal.bsa.org/globalpiracy2009/studies/globalpiracystudy2009. pdf
-
(2009)
Seventh Annual Global Software Piracy Study
-
-
-
5
-
-
0032672290
-
Sine-fitting software for IEEE Standards 1057 and 1241
-
J. Blair, "Sine-fitting software for IEEE Standards 1057 and 1241," in Instrumentation and Measurement Technology Conference, 1999. IMTC/99. Proceedings of the 16th IEEE, 1999, pp. 1504-1506 vol.3.
-
Instrumentation and Measurement Technology Conference, 1999. IMTC/99. Proceedings of the 16th IEEE, 1999
, vol.3
, pp. 1504-1506
-
-
Blair, J.1
-
6
-
-
0037821601
-
Sine-wave parameters estimation - The second source of inaccuracy
-
K. Hejn and A. Pacut, "Sine-wave parameters estimation - the second source of inaccuracy," in Instrumentation and Measurement Technology Conference, 2003. IMTC '03. Proceedings of the 20th IEEE, 2003, pp. 1328-1333 vol.2.
-
Instrumentation and Measurement Technology Conference, 2003. IMTC '03. Proceedings of the 20th IEEE, 2003
, vol.2
, pp. 1328-1333
-
-
Hejn, K.1
Pacut, A.2
-
7
-
-
36148967384
-
Making RFIDs unique - Radio frequency certificates of authenticity
-
G. DeJean and D. Kirovski, "Making RFIDs unique - radio frequency certificates of authenticity," in Antennas and Propagation Society International Symposium 2006, IEEE, 2006, pp. 1039-1042.
-
Antennas and Propagation Society International Symposium 2006, IEEE, 2006
, pp. 1039-1042
-
-
DeJean, G.1
Kirovski, D.2
-
8
-
-
77956220369
-
Kernel density estimation via diffusion
-
Z. I. Botev, J. F. Grotowski, and D. P. Kroese, "Kernel density estimation via diffusion," Annals of Statistics, vol. 38, pp. 2916-2957, 2010.
-
(2010)
Annals of Statistics
, vol.38
, pp. 2916-2957
-
-
Botev, Z.I.1
Grotowski, J.F.2
Kroese, D.P.3
-
9
-
-
77954619771
-
-
National Institute of Standards and Technology (U.S.). Available
-
National Institute of Standards and Technology (U.S.). (2008). Secure hash standard (SHS). Available: http://purl.access.gpo.gov/GPO/LPS121031
-
(2008)
Secure Hash Standard (SHS)
-
-
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
11
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels, "RFID security and privacy: a research survey," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 381-394, 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, pp. 381-394
-
-
Juels, A.1
-
13
-
-
31544454530
-
A system for verifying user identity and authorization at the point-of sale or access
-
G. Simmons, "A system for verifying user identity and authorization at the point-of sale or access," Cryptologia, vol. 8, pp. 1-21, 1984.
-
(1984)
Cryptologia
, vol.8
, pp. 1-21
-
-
Simmons, G.1
-
14
-
-
33745654539
-
RFID-Tags for Anti-counterfeiting
-
D. Pointcheval, Ed., ed: Springer Berlin / Heidelberg
-
P. Tuyls and L. Batina, "RFID-Tags for Anti-counterfeiting," in Topics in Cryptology - CT-RSA 2006. vol. 3860, D. Pointcheval, Ed., ed: Springer Berlin / Heidelberg, 2006, pp. 115-131.
-
(2006)
Topics in Cryptology - CT-RSA 2006
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
15
-
-
49049105769
-
Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications," in RFID, 2008 IEEE International Conference on, 2008, pp. 58-64.
-
RFID, 2008 IEEE International Conference on, 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
16
-
-
79957495727
-
-
[Online]. Available
-
Inkode, Inc. [Online]. Available: http://www.inkode.com
-
-
-
-
17
-
-
72549119359
-
Design of fully printable chipless RFID tag on flexible substrate for secure banknote applications
-
S. Preradovic and N. C. Karmakar, "Design of fully printable chipless RFID tag on flexible substrate for secure banknote applications," in Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, 2009, pp. 206-210.
-
Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, 2009
, pp. 206-210
-
-
Preradovic, S.1
Karmakar, N.C.2
-
18
-
-
79957487258
-
-
CrossID, Inc. [Online]. Available
-
CrossID, Inc. [Online]. Available: http://innovya.com/CrossID/
-
-
-
-
19
-
-
77958104372
-
Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards
-
H. P. Romero, K. A. Remley, D. F. Williams, and W. Chih-Ming, "Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards," Microwave Theory and Techniques, IEEE Transactions on, vol. 57, pp. 1383-1387, 2009.
-
(2009)
Microwave Theory and Techniques, IEEE Transactions on
, vol.57
, pp. 1383-1387
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Chih-Ming, W.4
|