@inproceedings{c74446e3c42847558deec8c6209bbc8c,
title = "SoK: RFID-based clone detection mechanisms for supply chains",
abstract = "Clone product injection into supply chains causes serious problems for industry and customers. Many mechanisms have been introduced to detect clone products in supply chains which make use of RFID technologies. .is article gives an overview of these mechanisms, categorizes them by hardware change requirements, and compares their a.ributes.",
author = "Hoda Maleki and Reza Rahaeimehr and {Van Dijk}, Marten",
note = "Funding Information: {\textquoteleft}is project was supported in part by the Comcast Center for Excellence in 2015 under award “Supply Chain Management”. Publisher Copyright: {\textcopyright} 2016 ACM.; 1st Workshop on Attacks and Solutions in Hardware Security, ASHES 2017 ; Conference date: 03-11-2017",
year = "2017",
month = nov,
day = "3",
doi = "10.1145/3139324.3139332",
language = "English (US)",
series = "ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017",
publisher = "Association for Computing Machinery, Inc",
pages = "33--41",
booktitle = "ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017",
}