{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:02:51Z","timestamp":1746244971950,"version":"3.40.4"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058849"},{"type":"electronic","value":"9783319058856"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05885-6_11","type":"book-chapter","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T15:08:12Z","timestamp":1396364892000},"page":"211-251","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Counterfeit RFID Tags Using Digital Forensic"],"prefix":"10.1007","author":[{"given":"JingHuey","family":"Khor","sequence":"first","affiliation":[]},{"given":"Widad","family":"Ismail","sequence":"additional","affiliation":[]},{"given":"Mohammad Ghulam","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Hagl, A., Aslanidis, K.: RFID: Fundamentals and Applications. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 3\u201326. Springer US (2009)","DOI":"10.1007\/978-0-387-76481-8_1"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TSMCC.2007.913918","volume":"38","author":"S. Piramuthu","year":"2008","unstructured":"Piramuthu, S.: Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a038(3), 360\u2013376 (2008)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-Tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"King, B., Zhang, X.: RFID: An Anticounterfeiting Tool. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 27\u201355. Springer US (2009)","DOI":"10.1007\/978-0-387-76481-8_2"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Lim, T.-L.: RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 131\u2013146. Springer US (2009)","DOI":"10.1007\/978-0-387-76481-8_6"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network: The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp. 1607\u20131612 (2005)","DOI":"10.1145\/1066677.1067041"},{"key":"11_CR7","unstructured":"MarketsandMarkets: Global Anti Counterfeit Packaging Market Food and Pharmaceuticals (2010)"},{"key":"11_CR8","unstructured":"RNCOS: Research Report on Global RFID Market Analysis Till 2010 (2010)"},{"key":"11_CR9","series-title":"LNEE","volume-title":"RFID Security and Privacy. Concepts, Protocols, and Architectures","author":"D. Henrici","year":"2008","unstructured":"Henrici, D.: RFID Security and Privacy. Concepts, Protocols, and Architectures. LNEE, vol.\u00a017. Springer, Heidelberg (2008)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Sharif, A., Potdar, V.: A Critical Analysis of RFID Security Protocols. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops, GinoWan, Okinawa, Japan, pp. 1357\u20131362 (2008)","DOI":"10.1109\/WAINA.2008.212"},{"key":"11_CR11","volume-title":"An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures","author":"S. Stadlober","year":"2005","unstructured":"Stadlober, S.: An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures. Graz University of Technology, Graz (2005)"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.compind.2008.12.003","volume":"60","author":"A.S. Mart\u00ednez-Sala","year":"2009","unstructured":"Mart\u00ednez-Sala, A.S., Egea-L\u00f3pez, E., Garc\u00eda-S\u00e1nchez, F., Garc\u00eda-Haro, J.: Tracking of Returnable Packaging and Transport Units with Active RFID in The Grocery Supply Chain. Computers in Industry\u00a060, 161\u2013171 (2009)","journal-title":"Computers in Industry"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Razaq, A., Luk, W.T., Shum, K.M., Cheng, L.M., Yung, K.N.: Second-Generation RFID. IEEE Security & Privacy, 21\u201322 (2008)","DOI":"10.1109\/MSP.2008.94"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1080793.1080805","volume-title":"Proceedings of the 4th ACM Workshop on Wireless Security","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Strengthening EPC Tags Against Cloning. In: Proceedings of the 4th ACM Workshop on Wireless Security, pp. 67\u201376. ACM, Cologne (2005)"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2006.17","volume":"5","author":"M.R. Rieback","year":"2006","unstructured":"Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing\u00a05(1), 62\u201369 (2006)","journal-title":"IEEE Pervasive Computing"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An Efficient Forward Private RFID Protocol. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA (2009)","DOI":"10.1145\/1653662.1653669"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks. In: Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, Barcelona, Spain, pp. 73\u201386 (2008)","DOI":"10.5220\/0001738800730086"},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.compind.2005.09.002","volume":"57","author":"K.H.M. Wong","year":"2006","unstructured":"Wong, K.H.M., Hui, P.C.L., Chan, A.C.K.: Cryptography and Authentication on RFID Passive Tags for Apparel Products. Computers in Industry\u00a057(4), 342\u2013349 (2006)","journal-title":"Computers in Industry"},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MPRV.2009.68","volume":"8","author":"L. Mirowski","year":"2009","unstructured":"Mirowski, L., Hartnett, J., Williams, R.: An RFID Attacker Behavior Taxonomy. IEEE Pervasive Computing\u00a08(4), 79\u201384 (2009)","journal-title":"IEEE Pervasive Computing"},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/JSYST.2007.909820","volume":"1","author":"M.O. Lehtonen","year":"2007","unstructured":"Lehtonen, M.O., Michahelles, F., Fleisch, E.: Trust and Security in RFID-Based Product Authentication Systems. IEEE Systems Journal\u00a01(2), 129\u2013144 (2007)","journal-title":"IEEE Systems Journal"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Koscher, K., Juels, A., Brajkovic, V., Kohno, T.: EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 33\u201342 (2009)","DOI":"10.1145\/1653662.1653668"},{"key":"11_CR22","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security Issues in E-Passports. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, pp. 74\u201388 (2005)"},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11277-010-0186-2","volume":"59","author":"J.H. Khor","year":"2010","unstructured":"Khor, J.H., Ismail, W., Younis, M.I., Sulaiman, M.K., Rahman, M.G.: Security Problems in an RFID System. Wireless Personal Communications\u00a059(1), 17\u201326 (2010)","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"11_CR24","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TNSM.2009.03.090305","volume":"6","author":"F. Kamoun","year":"2009","unstructured":"Kamoun, F.: RFID System Management: State-of-the Art and Open Research Issues. IEEE Transactions on Network and Service Management\u00a06(3), 190\u2013205 (2009)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/11832072_21","volume-title":"Security and Cryptography for Networks","author":"D.V. Bailey","year":"2006","unstructured":"Bailey, D.V., Juels, A.: Shoehorning Security into the EPC Tag Standard. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 303\u2013320. Springer, Heidelberg (2006)"},{"issue":"4","key":"11_CR26","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TSMCC.2010.2043949","volume":"40","author":"Y. Zuo","year":"2010","unstructured":"Zuo, Y.: Survivable RFID Systems: Issues, Challenges, and Techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a040(4), 406\u2013418 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Ghayal, A., Khan, Z., Moona, R.: SmartRF - A Flexible and Light-Weight RFID Middleware. In: Proceedings of the IEEE International Conference on e-Business Engineering, Xi\u2019an, China, pp. 317\u2013324 (2008)","DOI":"10.1109\/ICEBE.2008.74"},{"issue":"2","key":"11_CR28","first-page":"25","volume":"1","author":"F. Lin","year":"2009","unstructured":"Lin, F., Chen, B., Chan, C.Y., Wu, C.H., Ip, W.H., Mai, A., Wang, H., Liu, W.: The Design of a Lightweight RFID Middleware. International Journal of Engineering Business Management\u00a01(2), 25\u201330 (2009)","journal-title":"International Journal of Engineering Business Management"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Li, T.Y., Lim, T.L.: RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 131\u2013146. Springer US (2009)","DOI":"10.1007\/978-0-387-76481-8_6"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Danev, B., Capkun, S.: Physical-Layer Identification of UHF RFID Tags. In: Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, Chicago, Illinois, USA, pp. 353\u2013364 (2010)","DOI":"10.1145\/1859995.1860035"},{"issue":"6","key":"11_CR31","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/TDSC.2010.56","volume":"8","author":"S.C.G. Periaswamy","year":"2011","unstructured":"Periaswamy, S.C.G., Thompson, D.R., Jia, D.: Fingerprinting RFID Tags. IEEE Transactions on Dependable and Secure Computing\u00a08(6), 938\u2013943 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Van Staden, F.R., Venter, H.S.: Adding Digital Forensic Readiness to The Email Trace Header. In: Information Security for South Africa (ISSA), pp. 1\u20134 (2010)","DOI":"10.1109\/ISSA.2010.5588258"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Sammons, J.: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Elsevier (2012)","DOI":"10.1016\/B978-1-59749-661-2.00006-1"},{"key":"11_CR34","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research. In: The First Digital Forensic Research Workshop, Utica, New York (2001)"},{"key":"11_CR35","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1155\/2012\/891584","volume":"2012","author":"J.H. Khor","year":"2012","unstructured":"Khor, J.H., Ismail, W., Rahman, M.G.: Prevention and Detection Methods for Enhancing Security in an RFID System. International Journal of Distributed Sensor Networks\u00a02012, 8 (2012)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Chang, K.: RF and Microwave Wireless Systems. Wiley-Interscience (2000)","DOI":"10.1002\/0471224324"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Du, K.-L., Swamy, M.N.S.: Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511841453"},{"key":"11_CR38","unstructured":"Lu, D., So, D.K.C., Brown, A.K.: Receive Antenna Selection Scheme for V-BLAST with Mutual Coupling in Correlated Channels. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes, France, pp. 1970\u20131974 (2008)"},{"issue":"5","key":"11_CR39","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/el:20073877","volume":"43","author":"S. Lim","year":"2007","unstructured":"Lim, S., Ling, H.: Design of Electrically Small Yagi Antenna. Electronics Letters\u00a043(5), 256\u2013258 (2007)","journal-title":"Electronics Letters"},{"key":"11_CR40","unstructured":"Thomas, J.R., Nelson, J.K., Silverman, S., Silverman, S.J.: Research Methods in Physical Activity. Human Kinetics (2010)"},{"key":"11_CR41","unstructured":"Montgomery, D.: Design and Analysis of Experiments. John Wiley and Sons (2001)"},{"key":"11_CR42","unstructured":"Venkatesan, S.: Investigation of RFID Readability for License Plates in Static and Motion Testing. University of Nebraska, Lincoln (2011)"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Tamhane, A.C.: Statistical Analysis of Designed Experiments: Theory and Applications Wiley-Interscience (2009)","DOI":"10.1002\/9781118491621"},{"key":"11_CR44","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-71701-0_13","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z. Jian","year":"2007","unstructured":"Jian, Z., Shirai, H., Takahashi, I., Kuroiwa, J., Odaka, T., Ogura, H.: A Hybrid Command Sequence Model for Anomaly Detection. In: Zhou, Z.-H., Li, H., Yang, Q. (eds.) PAKDD 2007. LNCS (LNAI), vol.\u00a04426, pp. 108\u2013118. Springer, Heidelberg (2007)"},{"key":"11_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-03070-3_13","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"R. Tronci","year":"2009","unstructured":"Tronci, R., Giacinto, G., Roli, F.: Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method. In: Perner, P. (ed.) MLDM 2009. LNCS, vol.\u00a05632, pp. 163\u2013177. Springer, Heidelberg (2009)"},{"issue":"1","key":"11_CR46","first-page":"1","volume":"1","author":"J.C. Wu","year":"2008","unstructured":"Wu, J.C.: Operational Measures and Accuracies of ROC Curve on Large Fingerprint Data Sets. National Institute of Standards and Technology\u00a01(1), 1\u201323 (2008)","journal-title":"National Institute of Standards and Technology"},{"key":"11_CR47","doi-asserted-by":"crossref","unstructured":"Ramachandra, A.C., Pavithra, K., Yashasyini, K., Raja, K.B., Venugopal, K.R., Patnaik, L.M.: Cross-Validation for Graph Matching Based Offline Signature Verification. In: Annual IEEE India Conference, Kanpur, India, pp. 17\u201322 (2008)","DOI":"10.1109\/INDCON.2008.4768794"},{"issue":"1","key":"11_CR48","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.compbiomed.2010.11.003","volume":"41","author":"Y. Kutlu","year":"2011","unstructured":"Kutlu, Y., Kuntalp, D.: A Multi-Stage Automatic Arrhythmia Recognition and Classification System. Journal of Computers in Biology and Medicine\u00a041(1), 37\u201345 (2011)","journal-title":"Journal of Computers in Biology and Medicine"},{"issue":"5","key":"11_CR49","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1016\/j.arth.2008.05.026","volume":"24","author":"C.J. Chevillotte","year":"2009","unstructured":"Chevillotte, C.J., Ali, M.H., Trousdale, R.T., Larson, D.R., Gullerud, R.E., Berry, D.J.: Inflammatory Laboratory Markers in Periprosthetic Hip Fractures. Journal of Arthroplasty\u00a024(5), 722\u2013727 (2009)","journal-title":"Journal of Arthroplasty"},{"key":"11_CR50","volume-title":"Testing Statistical Hypotheses","author":"E.L. Lehmann","year":"2005","unstructured":"Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses. Springer, New York (2005)"},{"issue":"6","key":"11_CR51","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1061\/(ASCE)CP.1943-5487.0000177","volume":"26","author":"S. Taneja","year":"2012","unstructured":"Taneja, S., Akcamete, A., Akinci, B., Garrett, J., Soibelman, L., East, E.: Analysis of Three Indoor Localization Technologies for Supporting Operations and Maintenance Field Tasks. Journal of Computing in Civil Engineering\u00a026(6), 708\u2013719 (2012)","journal-title":"Journal of Computing in Civil Engineering"},{"key":"11_CR52","doi-asserted-by":"crossref","unstructured":"Bockstiegel, K.H., Benko, M.: Space Law: Basic Legal Documents. Eleven International Publishing (1990)","DOI":"10.1163\/9789004740525"},{"key":"11_CR53","unstructured":"Hayes, A.F.: Statistical Methods for Communication Science. Taylor & Francis (2012)"},{"key":"11_CR54","unstructured":"Wooldridge, J.M.: Introductory Econometrics: A Modern Approach. South Western, Cengage Learning (2009)"},{"key":"11_CR55","unstructured":"Bradley, T.: Essential Statistics for Economics, Business and Management. John Wiley & Sons (2007)"},{"key":"11_CR56","unstructured":"Rumsey, D.: Intermediate Statistics For Dummies. Wiley (2007)"},{"key":"11_CR57","unstructured":"Scutchfield, F.D., Keck, C.W.: Principles of Public Health Practice. Thomson\/Delmar Learning (2003)"},{"issue":"3","key":"11_CR58","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.biocon.2004.12.004","volume":"123","author":"A. Sinclair","year":"2005","unstructured":"Sinclair, A., Nantel, P., Catling, P.: Dynamics of Threatened Goldenseal Populations and Implications for Recovery. Biological Conservation\u00a0123(3), 355\u2013360 (2005)","journal-title":"Biological Conservation"},{"key":"11_CR59","unstructured":"Jackson, S.L.: Statistics: Plain and Simple. Cengage Learning (2009)"},{"key":"11_CR60","unstructured":"Creighton, T.B.: Schools and Data: The Educator\u2019s Guide for Using Data to Improve Decision Making. SAGE Publications (2006)"},{"key":"11_CR61","doi-asserted-by":"crossref","unstructured":"Lee, I.: Mobile Applications and Knowledge Advancements in E-Business. IGI Global (2012)","DOI":"10.4018\/978-1-4666-1960-9"}],"container-title":["Studies in Computational Intelligence","Computational Intelligence in Digital Forensics: Forensic Investigation and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05885-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T06:48:16Z","timestamp":1746168496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05885-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058849","9783319058856"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05885-6_11","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014]]}}}