{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:18:22Z","timestamp":1762017502145},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s00779-011-0390-4","type":"journal-article","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T10:16:34Z","timestamp":1307096194000},"page":"271-289","source":"Crossref","is-referenced-by-count":17,"title":["Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains"],"prefix":"10.1007","volume":"16","author":[{"given":"Matthieu-P.","family":"Schapranow","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Zeier","sequence":"additional","affiliation":[]},{"given":"Hasso","family":"Plattner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"390_CR1","unstructured":"Amazon Web Services LLC (2010) Pricing. http:\/\/aws.amazon.com\/ec2\/pricing\/ . Checked on Apr 11, 2011"},{"key":"390_CR2","doi-asserted-by":"crossref","unstructured":"Bai Y, Wang F, Liu P, Zaniolo C, Liu S (2007) RFID data processing with a data stream query language. In: Proceedings of the 23rd international conference on data engineering. pp 1184\u20131193","DOI":"10.1109\/ICDE.2007.368977"},{"key":"390_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-8349-8731-0","volume-title":"Software-as-a-service: anbieterstrategien, Kundenbed\u00fcrfnisse und Wertsch\u00f6pfungsstrukturen","author":"A Benlian","year":"2010","unstructured":"Benlian A, Hess T, Buxmann P (2010) Software-as-a-service: anbieterstrategien, Kundenbed\u00fcrfnisse und Wertsch\u00f6pfungsstrukturen. Gabler Verlag, Wiesbaden"},{"key":"390_CR4","unstructured":"Bundesverband Informationswirtschaft, Telekommunikation und neue Medien (2005) White paper RFID Technologie, Systeme und Anwendungen http:\/\/www.bitkom.org\/files\/documents\/White_Paper_RFID_deutsch_11.08.2005__final.pdf . Checked on Apr 11, 2011"},{"key":"390_CR5","doi-asserted-by":"crossref","unstructured":"Chawathe SS, Krishnamurthy V, Ramachandran S, Sarma S (2004) Managing RFID data. In: Proceedings of the 30th international conference on very large data bases. VLDB Endowment, Toronto, pp 1189\u20131195","DOI":"10.1016\/B978-012088469-8.50104-2"},{"key":"390_CR6","doi-asserted-by":"crossref","unstructured":"Cheung A, Kailing K, Sch\u00f6nauer S (2007) Theseos: a query engine for traceability across sovereign, distributed RFID databases. In: ICDE. IEEE, pp 1495\u20131496","DOI":"10.1109\/ICDE.2007.369050"},{"key":"390_CR7","unstructured":"Choi S, Poon C (2008) An RFID-based anti-counterfeiting system. Int J Comput Sci 35(1)"},{"issue":"1","key":"390_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51(1):107\u2013113","journal-title":"Commun ACM"},{"key":"390_CR9","unstructured":"EPCglobal Inc (2007) EPCIS standard 1.0.1. http:\/\/www.gs1.org\/sites\/default\/files\/docs\/epcis\/epcis_1_0_1-standard-20070921.pdf . Checked on Apr 11, 2011"},{"key":"390_CR10","unstructured":"EPCglobal Inc (2010) Architecture framework v. 1.4. http:\/\/www.gs1.org\/gsmp\/kc\/epcglobal\/architecture\/architecture_1_4-framework-20101215.pdf . Checked on Apr 11, 2011"},{"key":"390_CR11","unstructured":"EPCglobal Inc (2010) Tag data standard 1.5. http:\/\/www.gs1.org\/sites\/default\/files\/docs\/tds\/tds_1_5-standard-20100818.pdf . Checked on Apr 11, 2011"},{"key":"390_CR12","unstructured":"ETSI (2010) Coordinated ESO response to phase 1 of EU mandate M436. http:\/\/www.cen.eu\/cen\/Sectors\/Sectors\/ISSS\/Documents\/RFID-DTR07044v006-draft-for-public-comments.pdf . Checked on Apr 11, 2011"},{"key":"390_CR13","unstructured":"European Commission (2008) Pharmaceutical sector inquiry preliminary report"},{"key":"390_CR14","unstructured":"European Commission Taxation and Customs Union (2009) Report on EU Customs Enforcement of IP Rights. http:\/\/ec.europa.eu\/taxation_customs\/resources\/documents\/customs\/customs_controls\/counterfeit_piracy\/statistics\/2009_statistics_for_2008_full_report_en.pdf . Checked on Apr 11, 2011"},{"key":"390_CR15","unstructured":"Fazzinga B, Flesca S, Masciari E, Furfaro F (2009) Efficient and effective RFID data warehousing. In: Proceedings of the international database engineering applications symposium. ACM, New York, pp 251\u2013258 (2009). doi: http:\/\/doi.acm.org\/10.1145\/1620432.1620459"},{"key":"390_CR16","unstructured":"Fosstrak (2009) Project license. http:\/\/www.fosstrak.org\/epcis\/license.html . Checked on Apr 11, 2011"},{"key":"390_CR17","unstructured":"Fuchs DIF (2007) Sicherheit von internet- und intranetdiensten. GRIN Verlag"},{"key":"390_CR18","doi-asserted-by":"crossref","unstructured":"Gonzalez H, Han J, Li X, Klabjan D (2006) Warehousing and analyzing massive RFID data sets. In: Proceedings of the 22nd international conference on data engineering. Washington, p 83","DOI":"10.1109\/ICDE.2006.171"},{"key":"390_CR19","doi-asserted-by":"crossref","unstructured":"Grund M, Schaffner J, Kr\u00fcger J, Brunnert J, Zeier A (2010) The effects of virtualization on main memory systems. In: Proceedings of the 6th international workshop on data management on new hardware","DOI":"10.1145\/1869389.1869395"},{"key":"390_CR20","unstructured":"GS1 Germany GmbH (2010) Preise f\u00fcr die Nutzung des Leistungspaketes GS1 complete. http:\/\/www.gs1-germany.de\/service\/gs1_complete\/preisliste\/index_ger.htmlAl . Checked on Apr 11, 2011"},{"key":"390_CR21","unstructured":"Hewlett Packard HP Workstation xw9400. http:\/\/h20195.www2.hp.com\/V2\/GetDocument.aspx?docname=4AA0-4798EEE&doclang=EN_GB . Checked on Apr 11, 2011"},{"key":"390_CR22","unstructured":"IBM Corporation Software Pricing. https:\/\/www-112.ibm.com\/software\/howtobuy\/buyingtools\/paexpress\/Express?P0=E1&part_number=D0A4DLL,D0A4QLL,D0A4WLL,D0A4YLL,D0A5LLL,D0A5NLL,&catalogLocale=de_DE&Locale=de_DE&country=DEU&brand=ws&PT=html . Checked on Apr 11, 2011"},{"key":"390_CR23","unstructured":"ICC Policy Statement (2003) The fight against piracy and counterfeiting of intellectual property. http:\/\/www.iccwbo.org\/home\/intellectual_property\/fight_against_piracy.pdf . Checked on Apr 11, 2011"},{"key":"390_CR24","unstructured":"IDAutomation.com Inc. Zebra R110Xi RFID Printer Encoder. http:\/\/www.idautomation.com\/rfid\/Zebra-RFID-Printer.html . Checked on Apr 11, 2011"},{"key":"390_CR25","unstructured":"IMS Health Inc (2010) Global pharmaceutical market growth of 5\u20137 percent in 2011. http:\/\/www.imshealth.com\/portal\/site\/imshealth\/menuitem.a46c6d4df3db4b3d88f611019418c22a\/?vgnextoid=119717f27128b210VgnVCM100000ed152ca2RCRD& . Checked on Apr 11, 2011"},{"key":"390_CR26","unstructured":"IP Crime Group (2008) IP Crime Report"},{"key":"390_CR27","unstructured":"ISO\/IEC. 27002 IT-Sicherheitsverfahren\u2014Leitfaden f\u00fcr das Informationssicherheits-management"},{"key":"390_CR28","unstructured":"ISO\/IEC (2001) 9126-1: software engineering: product quality"},{"key":"390_CR29","unstructured":"Jenkins J, Mills P, Maidment R, Profit M (2007) Pharma traceability business case report"},{"key":"390_CR30","volume-title":"Fundamental modeling concepts. Effective communication of IT systems","author":"A Kn\u00f6pfel","year":"2005","unstructured":"Kn\u00f6pfel A, Gr\u00f6ne B, Tabeling P (2005) Fundamental modeling concepts. Effective communication of IT systems. Wiley, London"},{"key":"390_CR31","volume-title":"Computer networking: a top-down approach","author":"JF Kurose","year":"2009","unstructured":"Kurose JF, Ross KW (2009) Computer networking: a top-down approach. 5th edn. Addison-Wesley, Reading","edition":"5"},{"key":"390_CR32","unstructured":"Lee CH, Chung CW (2008) Efficient storage scheme and query processing for supply chain management using RFID. In: Proceedings of the international conference on management of data. ACM, New York, pp 291\u2013302"},{"key":"390_CR33","unstructured":"macle GmbH HP. Proliant DL380 R05. http:\/\/www.macle.de\/hp.html . Checked on Apr 11, 2011"},{"key":"390_CR34","unstructured":"Miller P (2009) TCP\/IP\u2014the ultimate protocol guide\u2014data delivery and routing, vol 1. Universal-Publishers, Universal-Publishers"},{"key":"390_CR35","unstructured":"Mitrokotsa A, Rieback MR, Tanenbaum AS (2008) Classification of RFID attacks. In: Proceedings of the 2nd international workshop on RFID technology. pp 73\u201386"},{"issue":"1","key":"390_CR36","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/205447.205459","volume":"25","author":"P Mockapetris","year":"1995","unstructured":"Mockapetris P, Dunlap KJ (1995) Development of the domain name system. SIGCOMM Comput Commun Rev 25(1):112\u2013122","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"390_CR37","unstructured":"M\u00fcller J, Faust M, Schwalb D, Schapranow MP, Zeier A, Plattner H (2009) A software as a service RFID middleware for small and medium-sized enterprises. In: Proceedings of the 5th European workshop on RFID systems and technologies. VDE"},{"key":"390_CR38","doi-asserted-by":"crossref","unstructured":"M\u00fcller J, Oberst J, Wehrmeyer S, Witt J, Zeier A (2010) An aggregating discovery service for the EPCglobal network. In: Proceedings of the 43th Hawai\u2019i conference on system sciences. Koloa","DOI":"10.1109\/HICSS.2010.47"},{"key":"390_CR39","doi-asserted-by":"crossref","unstructured":"M\u00fcller J, P\u00f6pke C, Urbat M, Zeier A, Plattner H (2009) A simulation of the pharmaceutical supply chain to provide realistic test data. In: Proceedings of 1st international conference on advances in system simulation. IEEE","DOI":"10.1109\/SIMUL.2009.9"},{"key":"390_CR40","unstructured":"RFIDSupplyChain.com LLC Alien 915\u00a0MHz circular antenna (ALR-9611-CR). http:\/\/www.rfidsupplychain.com\/-strse-13\/Alien-915-MHz-Circular\/Detail.bok . Checked on Apr 11, 2011"},{"key":"390_CR41","unstructured":"RFIDSupplyChain.com LLC Alien 9800 EPC Multiprotocol RFID Fixed Reader. http:\/\/www.rfidsupplychain.com\/-strse-98\/Alien-9800-EPC-Multiprotocol\/Detail.bok . Checked on Apr 11, 2011"},{"key":"390_CR42","unstructured":"RFIDSupplyChain.com LLC Alien ALX-407 Antenna Mounting Bracket. http:\/\/www.rfidsupplychain.com\/-strse-195\/Alien-ALX-dsh-407-Antenna-Mounting\/Detail.bok . Checked on Apr 11, 2011"},{"key":"390_CR43","unstructured":"RFIDSupplyChain.com LLC Alien ALX-408 Antenna Extension Cable. http:\/\/www.rfidsupplychain.com\/-strse-196\/Alien-ALX-dsh-408-Antenna-Extension\/Detail.bok . Checked on Apr 11, 2011"},{"key":"390_CR44","doi-asserted-by":"crossref","unstructured":"Schaffner J, Bog A, Kr\u00fcger J, Zeier A (2008) A hybrid row-column OLTP database architecture for operational reporting. In: Business intelligence for the real time enterprise. Auckland","DOI":"10.1007\/978-3-642-03422-0_5"},{"key":"390_CR45","doi-asserted-by":"crossref","unstructured":"Schaffner J, Jacobs D, Eckart B, Brunnert J, Zeier A (2010) Towards enterprise software as a service in the cloud. In: Proceedings of the 2nd IEEE workshop on information and software as services","DOI":"10.1109\/ICDEW.2010.5452748"},{"key":"390_CR46","doi-asserted-by":"crossref","unstructured":"Schapranow MP, M\u00fcller J, Enderlein S, Helmich M, Zeier A (2009) Low-cost mutual RFID authentication model using predefined password lists. In: Proceedings of the 16th international conference on industrial engineering and engineering management","DOI":"10.1109\/ICIEEM.2009.5344198"},{"key":"390_CR47","unstructured":"Schapranow MP, M\u00fcller J, Zeier A, Plattner H (2009) Security aspects in vulnerable RFID-aided supply chains. In: Proceedings of 5th European workshop on RFID systems and technologies. VDE"},{"key":"390_CR48","unstructured":"Schapranow MP, M\u00fcller J, Zeier A, Plattner H (2010) RFID event data processing: an architecture for storing and searching. In: Proceedings of the 4th international workshop on RFID technology\u2014concepts, applications, challenges"},{"key":"390_CR49","unstructured":"Schapranow MP, Nagora M, Zeier A (2010) CoMoSeR: cost model for security-enhanced RFID-aided supply chains. In: Proceedings of the 18th international conference on software telecommunications and computer networks. IEEE"},{"key":"390_CR50","doi-asserted-by":"crossref","unstructured":"Schapranow MP, Zeier A, Plattner H (2010) A dynamic mutual RFID authentication model preventing unauthorized third party access. In: Proceedings of the 4th international conference on network and system security","DOI":"10.1109\/NSS.2010.46"},{"key":"390_CR51","doi-asserted-by":"crossref","unstructured":"Schapranow MP, Zeier A, Plattner H (2011) A formal model for enabling RFID in pharmaceutical supply chains. In: Proceedings of the 44th Hawaii international conference on system sciences","DOI":"10.1109\/HICSS.2011.10"},{"key":"390_CR52","doi-asserted-by":"crossref","unstructured":"Seo DH, Baek JM, Cho DS (2009) Secure RFID authentication scheme for EPC class Gen2. In: Proceedings of the 3rd international conference on ubiquitous information management and communication, ACM, New York, pp 221\u2013227. doi: 10.1145\/1516241.1516280","DOI":"10.1145\/1516241.1516280"},{"key":"390_CR53","first-page":"236","volume":"14","author":"N Shukla","year":"2009","unstructured":"Shukla N, Sangal T (2009) Generic drug industry in india: the counterfeit spin. J Intell Prop Right 14:236\u2013240","journal-title":"J Intell Prop Right"},{"key":"390_CR54","doi-asserted-by":"crossref","unstructured":"Staake T, Thiesse F, Fleisch E (2005) Extending the EPC network: the potential of RFID in anti-counterfeiting. In: Proceedings of the ACM symposium on applied computing. ACM, New York, pp 1607\u20131612","DOI":"10.1145\/1066677.1067041"},{"key":"390_CR55","volume-title":"Data and computer communications","author":"W. Stallings","year":"2007","unstructured":"Stallings W (2007) Data and computer communications. 8th edn. Prentice Hall, Englewood Cliffs","edition":"8"},{"key":"390_CR56","unstructured":"Stiehler A, Wichmann T (2005) RFID im Pharma- und Gesundheitssektor. Vision und Realit\u00e4t RFID-basierter Netzwerke f\u00fcr Medikamente. Berlecon report"},{"key":"390_CR57","unstructured":"TAGnology RFID GmbH: Impinj Thin Propeller Label 3.875\u201d x 0.5\u201d. http:\/\/www.rfid-webshop.com\/product_info.php\/info\/p482_Impinj-Thin-Propeller-Label-3-875-x-0-5-in\u2014mm-.html . Checked on Apr 11, 2011"},{"key":"390_CR58","unstructured":"The European Parliament and the Council of the European Union (1995) Directive 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Community"},{"key":"390_CR59","doi-asserted-by":"crossref","unstructured":"Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Proceedings of the RSA conference. pp 115\u2013131","DOI":"10.1007\/11605805_8"},{"issue":"2","key":"390_CR60","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186\u2013204","journal-title":"Manag Sci"},{"key":"390_CR61","unstructured":"Wang F, Liu P (2005) Temporal manegement of RFID data. In: Proceedings of the 31st internatioal conference on very large data bases. VLDB Endowment, Norway"},{"key":"390_CR62","doi-asserted-by":"crossref","unstructured":"Wang F, Liu S, Liu P, Bai Y (2006) Bridging physical and virtual worlds: complex event processing for RFID data streams. In: Advances in database technology, vol 3896\/2006, Springer, Berlin, pp 588\u2013607","DOI":"10.1007\/11687238_36"},{"key":"390_CR63","doi-asserted-by":"crossref","unstructured":"White GR, Gardiner G, Prabhakar G, Razak AA (2007) A comparison of barcode and RFID technologies in practice. J Inf Inf Technol Organ 2","DOI":"10.28945\/142"},{"issue":"3, 4","key":"390_CR64","first-page":"57","volume":"6","author":"A Zeier","year":"2009","unstructured":"Zeier A, Hofmann P, Kr\u00fcger J, M\u00fcller J, Schapranow MP (2009) Integration of RFID technology is a key enabler for demand-driven supply network. IUP J Supply Chain Manag 6(3, 4):57\u201374","journal-title":"IUP J Supply Chain Manag"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0390-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0390-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0390-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T07:07:29Z","timestamp":1560236849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0390-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["390"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0390-4","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,4]]}}}