International audienceIndustrial companies lose large sums of money because of counterfeits and they need to efficiently protect their trademarks. Most of them implement their own anti-counterfeiting policy to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and authenticate genuine products. Instead of using markers and additional identification means, one of the recent methods use a PUF-like authentication method based on image processing. However, in order to authenticate the object (e.g. a trademark product),the method needs direct access to the database system containing the object's “fingerprint”. The paper presents a new secure method to remotely au...
International audienceThis work aims to embed an object authentication process in a secure electroni...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
International audienceIndustrial companies lose large sums of money because of counterfeits and they...
Industrial companies lose large sums of money because of coun- terfeits and they need to eciently pr...
Industrial companies lose large sums of money because of coun- terfeits and they need to eciently pr...
Abstract—Product authentication is needed to detect counterfeit products and to prevent them from en...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
Artwork counterfeiting is a wide problem in the art market, both for private subjects and museums. F...
Artwork counterfeiting is a wide problem in the art market, both for private subjects and museums. F...
International audienceThis paper follows a paper by Bringer et al.3 to adapt a security model and pr...
International audienceThis paper follows a paper by Bringer et al.3 to adapt a security model and pr...
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consume...
International audienceThis work aims to embed an object authentication process in a secure electroni...
International audienceThis work aims to embed an object authentication process in a secure electroni...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
International audienceIndustrial companies lose large sums of money because of counterfeits and they...
Industrial companies lose large sums of money because of coun- terfeits and they need to eciently pr...
Industrial companies lose large sums of money because of coun- terfeits and they need to eciently pr...
Abstract—Product authentication is needed to detect counterfeit products and to prevent them from en...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
Artwork counterfeiting is a wide problem in the art market, both for private subjects and museums. F...
Artwork counterfeiting is a wide problem in the art market, both for private subjects and museums. F...
International audienceThis paper follows a paper by Bringer et al.3 to adapt a security model and pr...
International audienceThis paper follows a paper by Bringer et al.3 to adapt a security model and pr...
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consume...
International audienceThis work aims to embed an object authentication process in a secure electroni...
International audienceThis work aims to embed an object authentication process in a secure electroni...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...