Abstract
This chapter describes an examplary implementation based on digital product memories in the field of protection against counterfeit goods in manufacturing plants in the SemProM project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, H. Seuschek, A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography, in 4th Workshop on RFID Security (RFIDSec) (2008)
N.T. Courtois, K. Nohl, S. O’Neil, Algebraic attacks on the crypto-1 stream cipher in mifare classic and oyster cards. Cryptology ePrint Archive, Report 2008/166, 2008. http://eprint.iacr.org/
International Organization for Standardization, Identification Cards—Contactless Integrated Circuit(s) Cards—Proximity Cards. ISO Standard (ISO 14443), 2000. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=28728
International Organization for Standardization, Information Technology—Radio Frequency Identification for Item Management. ISO Standard (ISO 18000), 2004. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=34112
P. Stephan, M. Eich, J. Neidig, M. Rosjat, R. Hengst, Applying digital product memories in industrial production, in SemProM—Foundations of Semantic Product Memories for the Internet of Things, ed. by W. Wahlster. Cognitive Technologies (Springer, Berlin, 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Neidig, J. (2013). Using Basic RFID-Based Digital Product Memories for Protection against Counterfeit Goods in Manufacturing Plants. In: Wahlster, W. (eds) SemProM. Cognitive Technologies. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37377-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-37377-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37376-3
Online ISBN: 978-3-642-37377-0
eBook Packages: Computer ScienceComputer Science (R0)