TY - CHAP
T1 - Anti-counterfeiting and supply chain security
AU - Staake, Thorsten
AU - Michahelles, Florian
AU - Fleisch, Elgar
AU - Williams, John R.
AU - Min, Hao
AU - Cole, Peter H.
AU - Lee, Sang Gug
AU - McFarlane, Duncan
AU - Murai, Jun
PY - 2008/12/1
Y1 - 2008/12/1
N2 - Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters.
AB - Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters.
UR - http://www.scopus.com/inward/record.url?scp=79960921836&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79960921836&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-71641-9_2
DO - 10.1007/978-3-540-71641-9_2
M3 - Chapter
AN - SCOPUS:79960921836
SN - 9783540716402
SP - 33
EP - 43
BT - Networked RFID Systems and Lightweight Cryptography
PB - Springer Berlin Heidelberg
ER -