Counterfeiting

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 10881 Experts worldwide ranked by ideXlab platform

Lejla Batina - One of the best experts on this subject based on the ideXlab platform.

  • Public-key cryptography for RFID-tags
    2007
    Co-Authors: Lejla Batina, T. Kerins, Nele Mentens, Pim Tuyls, Jorge Guajardo, Ingrid Verbauwhede
    Abstract:

    RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for anti-Counterfeiting by embedding them into a product. Public-key cryptography (PKC) offers an attractive solution to the Counterfeiting problem but whether a publickey cryptosystem can be implemented on an RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols are useful for these anti-Counterfeiting applications. We also discuss the feasibility of identification protocols based on elliptic curve cryptography (ECC) and show that it is feasible on RFID tags. Finally, we compare different implementation options and explore the cost that side-channel attack countermeasures would have on such implementations

  • rfid tags for anti Counterfeiting
    2006
    Co-Authors: Pim Tuyls, Lejla Batina
    Abstract:

    RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prevent Counterfeiting. In order to be successful for these security purposes too, RFID-tags have to be resistant against many attacks, in particular against cloning of the tag. In this paper, we investigate how an RFID-tag can be made unclonable by linking it inseparably to a Physical Unclonable Function (PUF). We present the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system. We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID-tags is feasible in the off-line case.

Bin Song - One of the best experts on this subject based on the ideXlab platform.

Yiling Zhong - One of the best experts on this subject based on the ideXlab platform.

Pawan Kumar - One of the best experts on this subject based on the ideXlab platform.

  • highly luminescent dual mode polymeric nanofiber based flexible mat for white security paper and encrypted nanotaggant applications
    2018
    Co-Authors: Pawan Kumar, Amit Kumar Gangwar, Ashish Gupta, Garima Kedawat, Bhanu Pratap Singh, Nidhi Singh, Avanish Kumar Srivastava
    Abstract:

    Increasing Counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-Counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF4 :Eu3+ @NaYF4 :Yb3+ , Er3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF4 :Eu3+ ) and green (NaYF4 :Yb3+ , Er3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against Counterfeiting.

  • future prospects of luminescent nanomaterial based security inks from synthesis to anti Counterfeiting applications
    2016
    Co-Authors: Pawan Kumar, Satbir Singh, Bipin Kumar Gupta
    Abstract:

    Counterfeiting of valuable documents, currency and branded products is a challenging problem that has serious economic, security and health ramifications for governments, businesses and consumers all over the world. It is estimated that Counterfeiting represents a multi-billion dollar underground economy with counterfeit products being produced on a large scale every year. Counterfeiting is an increasingly high-tech crime and calls for high-tech solutions to prevent and deter the acts of Counterfeiting. The present review briefly outlines and addresses the key challenges in this area, including the above mentioned concerns for anti-Counterfeiting applications. This article describes a unique combination of all possible kinds of security ink formulations based on lanthanide doped luminescent nanomaterials, quantum dots (semiconductor and carbon based), metal organic frameworks as well as plasmonic nanomaterials for their possible use in anti-Counterfeiting applications. Moreover, in this review, we have briefly discussed and described the historical background of luminescent nanomaterials, basic concepts and detailed synthesis methods along with their characterization. Furthermore, we have also discussed the methods adopted for the fabrication and design of luminescent security inks, various security printing techniques and their anti-Counterfeiting applications.

Pim Tuyls - One of the best experts on this subject based on the ideXlab platform.

  • Public-key cryptography for RFID-tags
    2007
    Co-Authors: Lejla Batina, T. Kerins, Nele Mentens, Pim Tuyls, Jorge Guajardo, Ingrid Verbauwhede
    Abstract:

    RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for anti-Counterfeiting by embedding them into a product. Public-key cryptography (PKC) offers an attractive solution to the Counterfeiting problem but whether a publickey cryptosystem can be implemented on an RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols are useful for these anti-Counterfeiting applications. We also discuss the feasibility of identification protocols based on elliptic curve cryptography (ECC) and show that it is feasible on RFID tags. Finally, we compare different implementation options and explore the cost that side-channel attack countermeasures would have on such implementations

  • rfid tags for anti Counterfeiting
    2006
    Co-Authors: Pim Tuyls, Lejla Batina
    Abstract:

    RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prevent Counterfeiting. In order to be successful for these security purposes too, RFID-tags have to be resistant against many attacks, in particular against cloning of the tag. In this paper, we investigate how an RFID-tag can be made unclonable by linking it inseparably to a Physical Unclonable Function (PUF). We present the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system. We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID-tags is feasible in the off-line case.