{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T13:58:10Z","timestamp":1775051890994,"version":"3.50.1"},"reference-count":48,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,3,16]],"date-time":"2012-03-16T00:00:00Z","timestamp":1331856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3,16]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571211210022","type":"journal-article","created":{"date-parts":[[2012,3,10]],"date-time":"2012-03-10T07:02:42Z","timestamp":1331362962000},"page":"340-359","source":"Crossref","is-referenced-by-count":38,"title":["Improving RFID traceability systems with verifiable quality"],"prefix":"10.1108","volume":"112","author":[{"given":"Guillermo","family":"Azuara","sequence":"first","affiliation":[]},{"given":"Jos\u00e9","family":"Luis Tornos","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Luis Salazar","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031420002878200_b1","doi-asserted-by":"crossref","unstructured":"Ala\u00f1\u00f3n, M.E., D\u00edaz\u2010Maroto, M.C., D\u00edaz\u2010Maroto, I.J., Vila\u2010Lameiro, P. and P\u00e9rez\u2010Coello, M.S. (2011), \u201cCyclic polyalcohols: fingerprints to identify the botanical origin of natural woods used in wine aging\u201d, Journal of Agricultural and Food Chemistry, Vol. 59 No. 4, pp. 1269\u201074.","DOI":"10.1021\/jf104737n"},{"key":"key2022031420002878200_b2","doi-asserted-by":"crossref","unstructured":"Albersmeier, F., Schulze, H., Jahn, G. and Spiller, A. (2009), \u201cThe reliability of third\u2010party certification in the food chain: from checklists to risk\u2010oriented auditing\u201d, Food Control, Vol. 20 No. 10, pp. 927\u201035.","DOI":"10.1016\/j.foodcont.2009.01.010"},{"key":"key2022031420002878200_b3","doi-asserted-by":"crossref","unstructured":"Angeles, R. (2005), \u201cRFID technologies: supply\u2010chain applications and implementation issues\u201d, Information Systems Management, Vol. 22 No. 1, pp. 51\u201065.","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7"},{"key":"key2022031420002878200_b4","doi-asserted-by":"crossref","unstructured":"Azuara, G., Salazar, J.L., Tornos, J.L. and Piles, J.J. (2010), \u201cReliable food traceability using RFID tagging\u201d, 14th Financial Cryptograpy and Data Security International Conference, FC 2010, Springer, pp. 57\u201067.","DOI":"10.1007\/978-3-642-14992-4_6"},{"key":"key2022031420002878200_b5","doi-asserted-by":"crossref","unstructured":"Banks, J., Pachano, M.A., Thompson, L.G. and Hanny, D. (2007), RFID Applied, Wiley, Hoboken, NJ.","DOI":"10.1002\/9780470168226"},{"key":"key2022031420002878200_b6","doi-asserted-by":"crossref","unstructured":"Barjis, J. and Samuel, F.W. (2010), \u201cOrganizational and business impacts of RFID technology\u201d, Business Process Management Journal, Vol. 16 No. 6, pp. 897\u2010903.","DOI":"10.1108\/14637151011092973"},{"key":"key2022031420002878200_b7","doi-asserted-by":"crossref","unstructured":"Benington, H.D. (1983), \u201cProduction of large computer programs\u201d, Annals of the History of Computing, Vol. 5 No. 4, pp. 350\u201061.","DOI":"10.1109\/MAHC.1983.10102"},{"key":"key2022031420002878200_b8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B. and Shacham, H. (2004), \u201cShort signatures from the weil pairing\u201d, Journal of Cryptology, Vol. 17 No. 4, pp. 297\u2010319.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"key2022031420002878200_b9","doi-asserted-by":"crossref","unstructured":"Bottani, E. and Rizzi, A. (2008), \u201cEconomical assessment of the impact of RFID technology and EPC system on the fast\u2010moving consumer goods supply chain\u201d, International Journal of Production Economics, Vol. 112 No. 2, pp. 548\u201069.","DOI":"10.1016\/j.ijpe.2007.05.007"},{"key":"key2022031420002878200_b10","doi-asserted-by":"crossref","unstructured":"Boursas, L. and Danciu, V.A. (2008), \u201cDynamic inter\u2010organizational cooperation setup in Circle\u2010of\u2010Trust environments\u201d, NOMS 2008 \u2013 IEEE\/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services, pp. 113\u201020.","DOI":"10.1109\/NOMS.2008.4575124"},{"key":"key2022031420002878200_b11","doi-asserted-by":"crossref","unstructured":"Carriquiry, M. and Babcock, B.A. (2007), \u201cReputations, market structure, and the choice of quality assurance systems in the food industry\u201d, American Journal of Agricultural Economics, Vol. 89 No. 1, pp. 12\u201023.","DOI":"10.1111\/j.1467-8276.2007.00959.x"},{"key":"key2022031420002878200_b12","doi-asserted-by":"crossref","unstructured":"Chryssochoidis, G., Karagiannaki, A., Pramatari, K. and Kehagia, O. (2009), \u201cA cost\u2010benefit evaluation framework of an electronic\u2010based traceability system\u201d, British Food Journal, Vol. 111 No. 6, pp. 565\u201082.","DOI":"10.1108\/00070700910966023"},{"key":"key2022031420002878200_b13","doi-asserted-by":"crossref","unstructured":"De Capitani, S., Foresti, S., Jajodia, S., Paraboschi, S. and Samarati, P. (2011), \u201cAuthorization enforcement in distributed query evaluation\u201d, Journal of Computer Security, Vol. 19, pp. 751\u201094.","DOI":"10.3233\/JCS-2010-0413"},{"key":"key2022031420002878200_b14","doi-asserted-by":"crossref","unstructured":"Fayolle, L., L\u00e9pine, T., Fournel, T. and Boutant, Y. (2008), \u201cDeflectometry for secure traceability\u201d, Journal of Physics: Conference Series, Vol. 139.","DOI":"10.1088\/1742-6596\/139\/1\/012023"},{"key":"key2022031420002878200_b15","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Juels, A. and Pappu, R. (2005), \u201cRFID privacy: an overview of problems and proposed solutions\u201d, Security & Privacy, IEEE, Vol. 3 No. 3, pp. 34\u201043.","DOI":"10.1109\/MSP.2005.78"},{"key":"key2022031420002878200_b16","unstructured":"Garrido, P., Naranjo, F., Tramullas, J., Esteban, M., L\u00f3pez, A., Azuara, G., Salinas, A., Ramos, P., Herv\u00e1s, E. and Pascual, E. (2010), \u201cFree traceability management using RFID and Topic Maps\u201d, in Castro, M. (Ed.), Proceedings of the 4th European Conference on Information Management and Evaluation, pp. 93\u2010103."},{"key":"key2022031420002878200_b17","unstructured":"Glover, B. and Bhatt, H. (2006), RFID Essentials (Theory in Practice), O'Reilly Media, Sebastopol, CA."},{"key":"key2022031420002878200_b18","doi-asserted-by":"crossref","unstructured":"He, W., Zhang, N., Tan, P.S., Lee, E.W., Li, T.Y. and Lim, T.L. (2008), \u201cA secure RFID\u2010based track and trace solution in supply chains\u201d, IEEE INDIN 2008: 6th IEEE International Conference on Industrial Informatics, pp. 1364\u20109.","DOI":"10.1109\/INDIN.2008.4618316"},{"key":"key2022031420002878200_b19","doi-asserted-by":"crossref","unstructured":"Huang, T., Yeh, Y. and Tzeng, D.D.S. (2011), \u201cBarcode\u2010like heteroduplex DNA pattern as an aid for rapid identification of anthracnose fungi\u201d, New Biotechnology, Vol. 28 No. 1, pp. 72\u20108.","DOI":"10.1016\/j.nbt.2010.06.013"},{"key":"key2022031420002878200_b20","unstructured":"ISO (2003), ISO\/IEC 13250:2003 Information Technology \u2013 SGML Applications \u2013 Topic Maps, ISO, Geneva."},{"key":"key2022031420002878200_b21","doi-asserted-by":"crossref","unstructured":"Jones, P., Clarke\u2010Hill, C., Hillier, D., Shears, P. and Comfort, D. (2004), \u201cRadio frequency identification in retailing and privacy and public policy issues\u201d, Management Research News, Vol. 27 Nos 8\/9, pp. 46\u201056.","DOI":"10.1108\/01409170410784563"},{"key":"key2022031420002878200_b22","doi-asserted-by":"crossref","unstructured":"Karlsen, K.M., Olsen, P. and Donnelly, K.A.\u2010M. (2010), \u201cImplementing traceability: practical challenges at a mineral water bottling plant\u201d, British Food Journal, Vol. 112 No. 2, pp. 187\u201097.","DOI":"10.1108\/00070701011018860"},{"key":"key2022031420002878200_b23","doi-asserted-by":"crossref","unstructured":"Kelepouris, T., Pramatari, K. and Doukidis, G. (2007), \u201cRFID\u2010enabled traceability in the food supply chain\u201d, Industrial Management & Data Systems, Vol. 107 No. 2, pp. 183\u2010200.","DOI":"10.1108\/02635570710723804"},{"key":"key2022031420002878200_b24","doi-asserted-by":"crossref","unstructured":"Kvarnstr\u00f6m, B. and Vanhatalo, E. (2010), \u201cUsing RFID to improve traceability in process industry: experiments in a distribution chain for iron ore pellets\u201d, Journal of Manufacturing Technology Management, Vol. 21 No. 1, pp. 139\u201054.","DOI":"10.1108\/17410381011011524"},{"key":"key2022031420002878200_b25","doi-asserted-by":"crossref","unstructured":"Kwok, S.K., Ting, S.K., Tsang, A.H.C. and Cheung, C.F. (2010), \u201cA counterfeit network analyzer based on RFID and EPC\u201d, Industrial Management & Data Systems, Vol. 110 No. 7, pp. 1018\u201037.","DOI":"10.1108\/02635571011069086"},{"key":"key2022031420002878200_b26","doi-asserted-by":"crossref","unstructured":"Lee, S.M., Park, S.H., Yoon, S.N. and Yeon, S.J. (2007), \u201cRFID based ubiquitous commerce and consumer trust\u201d, Industrial Management & Data Systems, Vol. 107 No. 5, pp. 605\u201017.","DOI":"10.1108\/02635570710750381"},{"key":"key2022031420002878200_b27","doi-asserted-by":"crossref","unstructured":"Lenstra, A.K. and Verheul, E.R. (2001), \u201cSelecting cryptographic key sizes\u201d, Journal of Cryptology, Vol. 14 No. 4, pp. 255\u201093.","DOI":"10.1007\/s00145-001-0009-4"},{"key":"key2022031420002878200_b28","unstructured":"L\u00f3pez, A.M., Pascual, E., Salinas, A.M., Ramos, P. and Azuara, G. (2009), \u201cDesign of a RFID based traceability system in a slaughterhause\u201d, in Schneider, M., Kr\u00f6, A., Alvarado, J.E., Higuera, A.G., Augusto, J.C., Cook, D.J., Ikonen, V., \u010cech, P., Mikuleck\u00fd, P., Kameas, A. and Callaghan, V. (Eds), Workshops Proceedings of the 5th International Conference on Intelligent Environments, IOS Press, Amsterdam, pp. 67\u20108."},{"key":"key2022031420002878200_b29","doi-asserted-by":"crossref","unstructured":"Lyu, J. Jr, Chang, S. and Chen, T. (2009), \u201cIntegrating RFID with quality assurance system \u2013 framework and applications\u201d, Expert Systems with Applications, Vol. 36 No. 8, pp. 10877\u201082.","DOI":"10.1016\/j.eswa.2009.01.082"},{"key":"key2022031420002878200_b30","doi-asserted-by":"crossref","unstructured":"McFarlane, D., Sarma, S., Chirn, J.L., Wong, C.Y. and Ashton, K. (2003), \u201cAuto ID systems and intelligent manufacturing control\u201d, Engineering Applications of Artificial Intelligence, Vol. 16 No. 4, pp. 365\u201076.","DOI":"10.1016\/S0952-1976(03)00077-0"},{"key":"key2022031420002878200_b31","doi-asserted-by":"crossref","unstructured":"Mehrjerdi, Y.Z. (2011), \u201cRFID: the big player in the libraries of the future\u201d, Electronic Library, Vol. 29 No. 1, pp. 36\u201051.","DOI":"10.1108\/02640471111111424"},{"key":"key2022031420002878200_b32","doi-asserted-by":"crossref","unstructured":"Menezes, A.J. (1994), Elliptic Curve Public Key Cryptosystems, Kluwer Academic, Norwell, MA.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"key2022031420002878200_b33","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Rieback, M.R. and Tanenbaum, A.S. (2010), \u201cClassifying RFID attacks and defenses\u201d, Information Systems Frontiers, Vol. 12 No. 5, pp. 491\u2010505.","DOI":"10.1007\/s10796-009-9210-z"},{"key":"key2022031420002878200_b34","doi-asserted-by":"crossref","unstructured":"\u00d6zsu, M.T. and Valduriez, P. (1991), \u201cDistributed database systems: where are we now?\u201d, IEEE Computer, Vol. 24 No. 8, pp. 68\u201078.","DOI":"10.1109\/2.84879"},{"key":"key2022031420002878200_b35","unstructured":"Park, J. and Hunting, S. (2002), XML Topic Maps: Creating and Using Topic Maps for the Web, Addison\u2010Wesley Longman, Boston, MA."},{"key":"key2022031420002878200_b36","doi-asserted-by":"crossref","unstructured":"Park, K.S., Koh, C.E. and Kyungdoo \u201cTed\u201d Nam (2010), \u201cPerceptions of RFID technology: a cross\u2010national study\u201d, Industrial Management & Data Systems, Vol. 110 No. 5, pp. 682\u2010700.","DOI":"10.1108\/02635571011044722"},{"key":"key2022031420002878200_b37","doi-asserted-by":"crossref","unstructured":"Roman, R. and Lopez, J. (2009), \u201cIntegrating wireless sensor networks and the internet: a security analysis\u201d, Internet Research, Vol. 19 No. 2, pp. 246\u201059.","DOI":"10.1108\/10662240910952373"},{"key":"key2022031420002878200_b38","doi-asserted-by":"crossref","unstructured":"Sarac, A., Absi, N. and Dauz\u00e8re\u2010P\u00e9r\u00e8s, S. (2010), \u201cA literature review on the impact of RFID technologies on supply chain management\u201d, International Journal of Production Economics, Vol. 128 No. 1, pp. 77\u201095.","DOI":"10.1016\/j.ijpe.2010.07.039"},{"key":"key2022031420002878200_b39","doi-asserted-by":"crossref","unstructured":"Shears, P. (2010), \u201cFood fraud \u2013 a current issue but an old problem\u201d, British Food Journal, Vol. 112 No. 2, pp. 198\u2010213.","DOI":"10.1108\/00070701011018879"},{"key":"key2022031420002878200_b40","doi-asserted-by":"crossref","unstructured":"Song, B. and Mitchell, C.J. (2011), \u201cScalable RFID security protocols supporting tag ownership transfer\u201d, Computer Communications, Vol. 34 No. 4, pp. 556\u201066.","DOI":"10.1016\/j.comcom.2010.02.027"},{"key":"key2022031420002878200_b41","doi-asserted-by":"crossref","unstructured":"Sumar, S. and Ismail, H. (1995), \u201cAdulteration of foods \u2013 past and present\u201d, Nutrition & Food Science, Vol. 95 No. 4, pp. 11\u201015.","DOI":"10.1108\/00346659510088663"},{"key":"key2022031420002878200_b42","doi-asserted-by":"crossref","unstructured":"Tedeschi, P., Co\u00efsson, J.D., Maietti, A., Cereti, E., Stagno, C., Travaglia, F., Arlorio, M. and Brandolini, V. (2011), \u201cChemotype and genotype combined analysis applied to tomato (Lycopersicon esculentum Mill) analytical traceability\u201d, Journal of Food Composition and Analysis, Vol. 24 No. 2, pp. 131\u20109.","DOI":"10.1016\/j.jfca.2010.06.008"},{"key":"key2022031420002878200_b43","doi-asserted-by":"crossref","unstructured":"V\u00e9ronneau, S. and Roy, J. (2009), \u201cRFID benefits, costs, and possibilities: the economical analysis of RFID deployment in a cruise corporation global service supply chain\u201d, International Journal of Production Economics, Vol. 122 No. 2, pp. 692\u2010702.","DOI":"10.1016\/j.ijpe.2009.06.038"},{"key":"key2022031420002878200_b44","doi-asserted-by":"crossref","unstructured":"Voulodimos, A.S., Patrikakis, C.Z., Sideridis, A.B., Ntafis, V.A. and Xylouri, E.M. (2010), \u201cA complete farm management system based on animal identification using RFID technology\u201d, Computers and Electronics in Agriculture, Vol. 70 No. 2, pp. 380\u20108.","DOI":"10.1016\/j.compag.2009.07.009"},{"key":"key2022031420002878200_b45","doi-asserted-by":"crossref","unstructured":"Want, R. (2006), \u201cAn introduction to RFID technology\u201d, Pervasive Computing, IEEE, Vol. 5 No. 1, pp. 25\u201033.","DOI":"10.1109\/MPRV.2006.2"},{"key":"key2022031420002878200_b46","doi-asserted-by":"crossref","unstructured":"Wu, N.C., Nystrom, M.A., Lin, T.R. and Yu, H.C. (2005), \u201cChallenges to global RFID adoption\u201d, Technovation, Vol. 6 No. 12, pp. 1317\u201023.","DOI":"10.1016\/j.technovation.2005.08.012"},{"key":"key2022031420002878200_b47","doi-asserted-by":"crossref","unstructured":"Wu, X., Wang, Y., Bai, J., Wang, H. and Chu, C. (2010), \u201cRFID application challenges and risk analysis\u201d, 17th International Conference on Industrial Engineering and Engineering Management, IE and EM2010, pp. 1086\u201090.","DOI":"10.1109\/ICIEEM.2010.5646426"},{"key":"key2022031420002878200_b48","doi-asserted-by":"crossref","unstructured":"Wyld, D.C. (2006), \u201cRFID 101: the next big thing for management\u201d, Management Research News, Vol. 29 No. 4, pp. 154\u201073.","DOI":"10.1108\/01409170610665022"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211210022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211210022\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211210022\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:40Z","timestamp":1753400320000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/112\/3\/340-359\/183387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,16]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3,16]]}},"alternative-id":["10.1108\/02635571211210022"],"URL":"https:\/\/doi.org\/10.1108\/02635571211210022","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3,16]]}}}