Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Ahmad Sghaier Omar, Otman Basir |
Smart Phone Anti-counterfeiting System Using a Decentralized Identity Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 2019 IEEE Canadian Conference of Electrical and Computer Engineering, CCECE 2019, Edmonton, AB, Canada, May 5-8, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0319-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Zhou, Jixin Ma 0001, Xiaoming Yao, Honglei Li 0003 |
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Innov. ![In: Int. J. Softw. Innov. 6(2), pp. 1-9, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Valter Costa, Armando Sousa, Ana Reis 0001 |
Preventing Wine Counterfeiting by Individual Cork Stopper Recognition Using Image Processing Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Imaging ![In: J. Imaging 4(4), pp. 54, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Yuetao Gao |
On the Use of Overt Anti-Counterfeiting Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mark. Sci. ![In: Mark. Sci. 37(3), pp. 403-424, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Tomruk Ustunkaya |
Combating Counterfeiting derived by 3D Printing: Consumer Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 9(1), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
21 | Grace Li Zhang, Bing Li 0005, Bei Yu 0001, David Z. Pan, Ulf Schlichtmann |
TimingCamouflage: Improving circuit security against counterfeiting by unconventional timing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2018 Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 19-23, 2018, pp. 91-96, 2018, IEEE, 978-3-9819263-0-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Naif Alzahrani, Nirupama Bulusu |
Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYBLOCK@MobiSys ![In: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June 15, 2018, pp. 30-35, 2018, ACM, 978-1-4503-5838-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Chia-Tsen Sun, Pei-Chun Kuan, Yu-Mei Wang, Chun-Shien Lu, Hsi-Chun Wang |
Integration of Graphic QR code and Identity Documents by Laser Perforation to Enhance Anti-Counterfeiting Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME Workshops ![In: 2018 IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops 2018, San Diego, CA, USA, July 23-27, 2018, pp. 1-6, 2018, IEEE Computer Society, 978-1-5386-4195-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Yuezhong Wu, Rongrong Chen, Yanxi Tan, Zongmiao Shao |
Research on Two-Dimensional Code Packaging Advertising and Anti-counterfeiting Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHIP ![In: Advanced Hybrid Information Processing - Second EAI International Conference, ADHIP 2018, Yiyang, China, October 5-6, 2018, Proceedings, pp. 28-36, 2018, Springer, 978-3-030-19085-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Jianle Zhu, Peng Cao, Xuan Wang, Peijun Huo, Fangfang Chen |
Research on printing quantum dot anti-counterfeiting image generation and recognition technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCIP ![In: Proceedings of the 4th International Conference on Communication and Information Processing, ICCIP '18, Qingdao, China, November 2-4, 2018, pp. 91-95, 2018, ACM, 978-1-4503-6534-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Kee-Youn Kang |
Counterfeiting, screening and government policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Econ. Theory ![In: J. Econ. Theory 172, pp. 26-54, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Shi-Jian Liu, Jing Zhang 0040, Jeng-Shyang Pan 0001, Cai-Jie Weng |
SVQR : A Novel Secure Visual Quick Response Code and Its Anti-counterfeiting Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 8(5), pp. 1132-1140, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
21 | Xi Tan, Mianxiong Dong, Cheng Wu, Kaoru Ota, Junyu Wang, Daniel W. Engels |
An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 3044-3054, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar 0001, Athanasios V. Vasilakos |
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 4(5), pp. 1634-1646, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Cédric Marchand 0002, Lilian Bossuet, Kris Gaj |
Area-oriented comparison of lightweight block ciphers implemented in hardware for the activation mechanism in the anti-counterfeiting schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Circuit Theory Appl. ![In: Int. J. Circuit Theory Appl. 45(2), pp. 274-291, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Masaki Fujikawa, Kouki Takayama, Shingo Fuchi |
Anti-counterfeiting Technique for Molded Resin Articles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIBE ![In: Proceedings of the 3rd International Conference on Industrial and Business Engineering, ICIBE 2017, Sapporo, Japan, August 17-19, 2017, pp. 46-50, 2017, ACM, 978-1-4503-5351-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Juliano Fischer Naves, Igor Monteiro Moraes |
Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2017 IEEE Symposium on Computers and Communications, ISCC 2017, Heraklion, Greece, July 3-6, 2017, pp. 1015-1020, 2017, IEEE Computer Society, 978-1-5386-1629-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Md Tanvir Arafin, Andrew Stanley, Praveen Sharma |
Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2017, Baltimore, MD, USA, May 28-31, 2017, pp. 1-4, 2017, IEEE, 978-1-4673-6853-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Zhou, Xiaoming Yao, Honglei Li 0003, Jixin Ma 0001 |
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 15th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2017, London, United Kingdom, June 7-9, 2017, pp. 19-23, 2017, IEEE, 978-1-5090-5756-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Dali Zhu, Wenjing Rong, Di Wu 0004, Na Pang |
Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 352-362, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Nikhil Gupta 0002, Fei Chen, Nektarios Georgios Tsoutsos, Michail Maniatakos |
ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22, 2017, pp. 82:1-82:6, 2017, ACM, 978-1-4503-4927-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Yang Xie, Ankur Srivastava 0001 |
Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22, 2017, pp. 9:1-9:6, 2017, ACM, 978-1-4503-4927-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | M. Bala Krishna, Arpit Dugar |
Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 90(1), pp. 381-398, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Neo C. K. Yiu |
An NFC-Enabled Anti-Counterfeiting System for Wine Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1601.06372, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
21 | Nikolay A. Zenkevich, Margarita Gladkova |
Price Competition on the Market of Counterfeiting Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGTR ![In: IGTR 18(2), pp. 1640006:1-1640006:10, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Wei-Hsun Lee, Chien-Ming Chou, Szu-Wen Wang |
An NFC Anti-Counterfeiting Framework for ID Verification and Image Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 21(4), pp. 646-655, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram |
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSS@AsiaCCS ![In: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS@AsiaCCS, Xi'an, China, May 30, 2016, pp. 70-81, 2016, ACM, 978-1-4503-4288-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Andrew Hennessy, Yu Zheng 0011, Swarup Bhunia |
JTAG-based robust PCB authentication for protection against counterfeiting attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016, pp. 56-61, 2016, IEEE, 978-1-4673-9569-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury, Biplob R. Ray |
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FNSS ![In: Future Network Systems and Security - Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings, pp. 126-141, 2016, 978-3-319-48020-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Xuemin Du, Juan Wang 0015, Huanqing Cui, Tianhong Tang, Tianzhun Wu |
Vapor-condensation-assisted reverse display for anti-counterfeiting applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEMS ![In: 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, NEMS 2016, Sendai, Japan, April 17-20, 2016, pp. 316-319, 2016, IEEE, 978-1-5090-1947-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Samira Hosseini, Mojtaba Mahdavi |
Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, ISCISC 2016, Tehran, Iran, September 7-8, 2016, pp. 13-19, 2016, IEEE, 978-1-5090-3949-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Shiu Hong Choi, Bo Yang 0027, H. H. Cheung, Y. X. Yang |
RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. ![In: Comput. Ind. 68, pp. 148-161, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Luciano Floridi |
The anti-counterfeiting trade agreement: the ethical analysis of a failure, and its lessons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics Inf. Technol. ![In: Ethics Inf. Technol. 17(2), pp. 165-173, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Rongsheng Xie, Chaoqun Hong, Shunzhi Zhu, Dapeng Tao |
Anti-counterfeiting digital watermarking algorithm for printed QR barcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 167, pp. 625-635, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Kilcullen |
Cryptography Based Solutions to Counterfeiting of Manufactured Goods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1512.00351, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Alvaro Botas, Ricardo J. Rodríguez, Teemu Uolevi Väisänen, Patrycjusz Zdzichowski |
Counterfeiting and Defending the Digital Forensic Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT/IUCC/DASC/PICom ![In: 15th IEEE International Conference on Computer and Information Technology, CIT 2015; 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015; 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015; 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, Liverpool, United Kingdom, October 26-28, 2015, pp. 1966-1971, 2015, IEEE, 978-1-5090-0154-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Hyunho Kang, Keiichi Iwamura |
Anti-counterfeiting Using Irregularities of Magnetic Flux Density. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT/IUCC/DASC/PICom ![In: 15th IEEE International Conference on Computer and Information Technology, CIT 2015; 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015; 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015; 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, Liverpool, United Kingdom, October 26-28, 2015, pp. 1325-1329, 2015, IEEE, 978-1-5090-0154-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Hongyu Liang, Keke Gai |
Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, August 24-26, 2015, pp. 1387-1392, 2015, IEEE, 978-1-4799-8937-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Lei Yang 0025, Pai Peng, Fan Dang 0001, Cheng Wang 0001, Xiang-Yang Li 0001, Yunhao Liu 0001 |
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015, pp. 1966-1974, 2015, IEEE, 978-1-4799-8381-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | André Gomes de Lira Muniz, Marcelo Nogueira, Jair Minoro Abe |
Importance of Bidimensional Data Matrix Code Against Medicine Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APMS (1) ![In: Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth - IFIP WG 5.7 International Conference, APMS 2015, Tokyo, Japan, September 7-9, 2015, Proceedings, Part I, pp. 582-588, 2015, Springer, 978-3-319-22755-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Christian Thiel 0003, Christoph Thiel |
Industry 4.0 - Challenges in Anti-Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015, pp. 111-120, 2015, Springer, 978-3-658-10933-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Juliano Fischer Naves, Igor Monteiro Moraes |
Analyzing the ACK Counterfeiting Attack in Delay and Disruption Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC ![In: 2014 Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2014, Florianopolis, Brazil, May 5-9, 2014, pp. 52-59, 2014, IEEE Computer Society, 978-1-4799-5612-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | André Schaller, Tolga Arul, Vincent van der Leest, Stefan Katzenbeisser 0001 |
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 83-100, 2014, Springer, 978-3-319-08592-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Abhishek Basak, Yu Zheng 0011, Swarup Bhunia |
Active defense against counterfeiting attacks through robust antifuse-based on-chip locks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 32nd IEEE VLSI Test Symposium, VTS 2014, Napa, CA, USA, April 13-17, 2014, pp. 1-6, 2014, IEEE Computer Society, 978-1-4799-2611-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Franck Guarnieri, Eric Przyswa |
Counterfeiting and Cybercrime: Stakes and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 29(4), pp. 219-226, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Hussain Nyeem, Wageeh W. Boles, Colin Boyd |
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 86-93, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Vincent van der Leest, Pim Tuyls |
Anti-counterfeiting with hardware intrinsic security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 13, Grenoble, France, March 18-22, 2013, pp. 1137-1142, 2013, EDA Consortium San Jose, CA, USA / ACM DL, 978-1-4503-2153-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Nathalie Kae-Nune, Stephanie Pesseguier |
Qualification and testing process to implement anti-counterfeiting technologies into IC packages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 13, Grenoble, France, March 18-22, 2013, pp. 1131-1136, 2013, EDA Consortium San Jose, CA, USA / ACM DL, 978-1-4503-2153-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Shiu Hong Choi, Bo Yang 0027, H. H. Cheung, Y. X. Yang |
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013, pp. 265-269, 2013, IEEE, 978-1-908320-20-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Yujia Li, Jingbing Li |
The Intelligent Texture Anti-counterfeiting Algorithm Based on DFT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013, pp. 590-593, 2013, IEEE, 978-0-7695-5120-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Harsha Umesh Babu |
Reflective-Physically Unclonable Function based System for Anti-Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
21 | Saloomeh Shariati |
Image-based physical unclonable functions for anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
21 | Matthieu-P. Schapranow, Jürgen Müller 0003, Alexander Zeier, Hasso Plattner |
Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 16(3), pp. 271-289, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Gergana Vladova, Julian Bahrs, Norbert Gronau |
Managing Knowledge Distribution to Prevent Product Imitation and Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Inf. Technol. ![In: Int. J. Intell. Inf. Technol. 8(2), pp. 14-30, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Abel Molina, Thomas Vidick, John Watrous |
Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TQC ![In: Theory of Quantum Computation, Communication, and Cryptography, 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers, pp. 45-64, 2012, Springer, 978-3-642-35655-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun |
FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, August 29-31, 2012, pp. 388-393, 2012, IEEE, 978-1-4673-2257-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Saloomeh Shariati, François Koeune, François-Xavier Standaert |
Security Analysis of Image-Based PUFs for Anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings, pp. 26-38, 2012, Springer, 978-3-642-32804-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Suying Sheng, Xinhua Wu |
A new digital anti-counterfeiting scheme based on chaotic cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2012, `Global Open Innovation Summit for Smart ICT Convergence`, Jeju Island, Korea, October 15-17, 2012, pp. 687-691, 2012, IEEE, 978-1-4673-4828-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee 0001 |
Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012, pp. 558-563, 2012, IEEE Computer Society, 978-1-4673-0867-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Farinaz Koushanfar, Saverio Fazzari, Carl McCants, William Bryson, Matthew Sale, Peilin Song, Miodrag Potkonjak |
Can EDA combat the rise of electronic counterfeiting? ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: The 49th Annual Design Automation Conference 2012, DAC '12, San Francisco, CA, USA, June 3-7, 2012, pp. 133-138, 2012, ACM, 978-1-4503-1199-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | H. H. Cheung, Shiu Hong Choi |
Implementation issues in RFID-based anti-counterfeiting systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. ![In: Comput. Ind. 62(7), pp. 708-718, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Julian Bahrs, Norbert Gronau, Gergana Vladova |
Managing knowledge distribution to prevent product imitation and counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, AMCIS 2011, Detroit, Michigan, USA, August 4-8 2011, 2011, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
21 | Emil Nilsson, Björn Nilsson, Eric Järpe |
A pharmaceutical anti-counterfeiting method using time controlled numeric tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFID-TA ![In: 2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011, Sitges, Spain, September 15-16, 2011, pp. 343-347, 2011, IEEE, 978-1-4577-0028-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Yin Leng Theng, Wee Teck Tan, May O. Lwin, Schubert Shou-Boon Foo |
An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Inf. Sci. ![In: Comput. Inf. Sci. 3(3), pp. 30-49, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede |
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Towards Hardware-Intrinsic Security ![In: Towards Hardware-Intrinsic Security - Foundations and Practice, pp. 237-257, 2010, Springer, 978-3-642-14451-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Darko Kirovski |
Anti-counterfeiting: Mixing the Physical and the Digital World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Towards Hardware-Intrinsic Security ![In: Towards Hardware-Intrinsic Security - Foundations and Practice, pp. 223-233, 2010, Springer, 978-3-642-14451-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Florian Kerschbaum, Nina Oertel |
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFIDSec ![In: Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers, pp. 124-137, 2010, Springer, 978-3-642-16821-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Oliver Kleine, Marcus Schröter |
Exploring Anti-Counterfeiting Strategies: A Preliminary System Dynamics Framework for a Quantitative Counterstrategy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR ![In: Operations Research Proceedings 2010, Selected Papers of the Annual International Conference of the German Operations Research Society, Universität der Bundeswehr, München, September 1-3, 2010, pp. 565-570, 2010, Springer, 978-3-642-20008-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Albert B. Jeng, Li-Chung Chang, Te-En Wei, Hong-Zhe Li |
The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11-14, 2010, Proceedings, pp. 2681-2686, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jorge Guajardo, Boris Skoric, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert Jan Schrijen |
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 11(1), pp. 19-41, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Darko Kirovski |
Anti-Counterfeiting: Mixing the Physical and the Digital World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
21 | Ying Wang |
Design of an anti-counterfeiting system based on SMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GrC ![In: The 2009 IEEE International Conference on Granular Computing, GrC 2009, Lushan Mountain, Nanchang, China, 17-19 August 2009, pp. 572-575, 2009, IEEE Computer Society, 978-1-4244-4830-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak |
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 28, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ali Dada, Carsten Magerkurth |
RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWRT ![In: RFID Technology - Concepts, Applications, Challenges, Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 101-114, 2008, INSTICC PRESS, 978-989-8111-46-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
21 | Alexander Kipp, Stefan Schellhammer |
Facilitating Standardization through Living Labs - The Example of Drug Counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bled eConference ![In: 21st Bled eConference: eCollaboration: Overcoming Boundaries Through Multi-Channel Interaction, Bled, Slovenia, June 15-18, 2008, pp. 13, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
21 | S. H. Choi, C. H. Poon |
An RFID-based Track-and-trace Anti-counterfeiting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Congress on Engineering ![In: Proceedings of the World Congress on Engineering, WCE 2007, London, UK, 2-4 July, 2007, pp. 1082-1087, 2007, Newswood Limited, 978-988-98671-5-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Jonathan Hope |
'Counterfeiting' Shakespeare: Evidence, Authorship and John Ford's Funerall Elegye.Brian Vickers. Cambridge: Cambridge University Press, 2002, 596 pp. ISBN 0-521-77243-5. £55.00 (hardback). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lit. Linguistic Comput. ![In: Lit. Linguistic Comput. 21(3), pp. 379-380, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Pierre Renaux |
Extraction d'informations à partir de documents juridiques : application à la contrefaçon de marques. (Information extraction from legal documents : application to trademark counterfeiting). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
21 | Yacov Yacobi |
On the economics of anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004, pp. 248-249, 2004, ACM, 1-58113-771-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Yongdong Wu, Changsheng Xu, Feng Bao 0001 |
Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIP ![In: Visualisation 2002, Selected Papers from the Pan-Sydney Area Workshop on Visual Information Processing, VIP2002, pp. 109-112, 2002, Australian Computer Society, 1-920682-01-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
16 | Deepak Vijaywargi, Dave Lewis 0002, Darko Kirovski |
Optical DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 222-229, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Kanokwan Kanyamee, Chanboon Sathitwiriyawong |
High-Availability Decentralized Multi-Agent Key Recovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 290-294, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jiaqi Zhu, Yu Huang 0004, Hanpin Wang |
A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 543-552, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Takeshi Furukawa |
Detecting the Spur Marks of Ink-Jet Printed Documents Using a Multiband Scanner in NIR Mode and Image Restoration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings, pp. 33-42, 2009, Springer, 978-3-642-03520-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Vashek Matyas, Daniel Cvrcek, Jan Krhovjak, Marek Kumpost |
Authorizing Card Payments with PINs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(2), pp. 64-68, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN technology, PIN pads, e-commerce |
16 | Dirk Henrici, Paul Müller 0001 |
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 50-59, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Privacy, Ubiquitous Computing, Pervasive Computing, RFID, Hash Functions |
16 | Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang |
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 629-640, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking |
16 | Ari Juels |
RFID security: in the shoulder and on the loading dock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 1, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 1171-1180, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
16 | Hongjie He, Jiashu Zhang, Fan Chen 0003 |
Fuzzy Database Mining and Information Retrieval A Chaos-Based Fragile Watermarking Scheme with Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (2) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 2, pp. 303-307, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Brian King, Xiaolan Joy Zhang |
Securing the Pharmaceutical Supply Chain using RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 23-28, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pharmaceutical supply chain, security, privacy, RFID |
16 | Alexander Ilic, Florian Michahelles, Elgar Fleisch |
The Dual Ownership Model: Using Organizational Relationships for Access Control in Safety Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 459-466, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yi-Ta Wu, Frank Y. Shih |
Genetic algorithm based methodology for breaking the steganalytic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 36(1), pp. 24-31, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Hua Yuan, Xiao-Ping (Steven) Zhang |
Multiscale Fragile Watermarking Based on the Gaussian Mixture Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(10), pp. 3189-3200, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park |
Mutual-Authentication Mechanism for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 449-460, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RFID, AES, cryptograph |
16 | Zoltán Nochta, Thorsten Staake, Elgar Fleisch |
Product Specific Security Features Based on RFID Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2006 International Symposium on Applications and the Internet Workshops (SAINT 2006 Workshops), 23-27 January 2006, Phoenix, Arizona, USA, pp. 72-75, 2006, IEEE Computer Society, 0-7695-2510-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Hong Hai Do, Jürgen Anke, Gregor Hackenbroich |
Architecture Evaluation for Distributed Auto-ID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland, pp. 30-34, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Munirul M. Haque, Sheikh Iqbal Ahamed |
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 14-18 August 2006, Columbus, Ohio, USA, pp. 189-195, 2006, IEEE Computer Society, 0-7695-2637-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Haritha Dasari, Chakravarthy Bhagvati |
Identification of Printing Process Using HSV Colour Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACCV (2) ![In: Computer Vision - ACCV 2006, 7th Asian Conference on Computer Vision, Hyderabad, India, January 13-16, 2006, Proceedings, Part II, pp. 692-701, 2006, Springer, 3-540-31244-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yongdong Wu |
On the security of an SVD-based ownership watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(4), pp. 624-627, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|