@inproceedings{c74446e3c42847558deec8c6209bbc8c,
title = "SoK: RFID-based clone detection mechanisms for supply chains",
abstract = "Clone product injection into supply chains causes serious problems for industry and customers. Many mechanisms have been introduced to detect clone products in supply chains which make use of RFID technologies. .is article gives an overview of these mechanisms, categorizes them by hardware change requirements, and compares their a.ributes.",
author = "Hoda Maleki and Reza Rahaeimehr and {Van Dijk}, Marten",
note = "Publisher Copyright: {\textcopyright} 2016 ACM.; 1st Workshop on Attacks and Solutions in Hardware Security, ASHES 2017 ; Conference date: 03-11-2017",
year = "2017",
month = nov,
day = "3",
doi = "10.1145/3139324.3139332",
language = "English (US)",
series = "ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017",
publisher = "Association for Computing Machinery, Inc",
pages = "33--41",
booktitle = "ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017",
}