WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/14301,
	  title     = {Anti-Counterfeiting Solution Employing Mobile RFID Environment},
	  author    = {Juhan Kim and  Howon Kim},
	  country	= {},
	  institution	= {},
	  abstract     = {EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.},
	    journal   = {International Journal of Electronics and Communication Engineering},
	  volume    = {1},
	  number    = {8},
	  year      = {2007},
	  pages     = {1208 - 1212},
	  ee        = {https://publications.waset.org/pdf/14301},
	  url   	= {https://publications.waset.org/vol/8},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 8, 2007},
	}