{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:30:42Z","timestamp":1763343042977,"version":"3.45.0"},"reference-count":43,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061560","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:13:06Z","timestamp":1745208786000},"page":"4257-4280","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies"],"prefix":"10.32604","volume":"83","author":[{"given":"Rajendren","family":"Subramaniam","sequence":"first","affiliation":[]},{"given":"Saaidal Razalli","family":"Azzuhri","sequence":"additional","affiliation":[]},{"given":"Teh Ying","family":"Wah","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Vimala","family":"Balakrishnan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"journal-title":"Trends in trade in counterfeit and pirated goods","year":"2019","author":"Trade","key":"ref1"},{"key":"ref2","series-title":"MATEC Web of Conferences","article-title":"International trade risks","volume":"292","author":"Hoke","year":"2019"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4058","DOI":"10.46609\/IJSSER.2022.v07i12.015","article-title":"New age tussle with the legal measures in controlling the counterfeiting practices: a specific study on ip segment","volume":"7","author":"Ranjan","year":"2022","journal-title":"Int J Soc Sci Econ Res"},{"key":"ref4","series-title":"Proceedings of the 2020 International Conference on Materials, Control, Automation and Electrical Engineering (MCAEE 2020)","first-page":"22","article-title":"Anti-counterfeiting traceability system for agricultural products based on RFID and blockchain","author":"Wang","year":"2020"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"76357","DOI":"10.1109\/ACCESS.2020.2989305","article-title":"Lightweight authentication protocol for NFC based anti-counterfeiting system in IoT infrastructure","volume":"8","author":"Alzahrani","year":"2020","journal-title":"IEEE Access"},{"key":"ref6","first-page":"41","article-title":"Anti-counterfeit packaging technologies: a strategic need for the Indian industry","author":"Dhar","year":"2009","journal-title":"Confed Indian Ind Gurgaon Confed Indian Ind"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"85493","DOI":"10.1109\/ACCESS.2022.3194319","article-title":"Blockchain technology for secure supply chain management: a comprehensive review","volume":"10","author":"Agarwal","year":"2022","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"158237","DOI":"10.1109\/ACCESS.2019.2950373","article-title":"Catch id if you can: dynamic id virtualization mechanism for the controller area network","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref9","series-title":"Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEX 2006)","first-page":"30","article-title":"Architecture evaluation for distributed auto-ID systems","author":"Do","year":"2006"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"7855","DOI":"10.3390\/su15107855","article-title":"Anti-counterfeiting and traceability consensus algorithm based on weightage to contributors in a food supply chain of Industry 4.0","volume":"15","author":"Tan","year":"2023","journal-title":"Sustainability"},{"key":"ref11","series-title":"Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems","first-page":"30","article-title":"Block-supply chain: a new anti-counterfeiting supply chain using NFC and blockchain","author":"Alzahrani","year":"2018"},{"key":"ref12","series-title":"2016 IEEE International Conference on Smart Computing (SMARTCOMP)","first-page":"1","article-title":"Securing pharmaceutical and high-value products against tag reapplication attacks using nfc tags","author":"Alzahrani","year":"2016"},{"key":"ref13","series-title":"2019 9th International Conference On Cloud Computing, Data Science & Engineering (Confluence)","first-page":"174","article-title":"Combating counterfeit drugs: a quantitative analysis on cracking down the fake drug industry by using blockchain technology","author":"Kumar","year":"2019"},{"key":"ref14","unstructured":"Subramaniam R, Azzuhri DSR, Wah DTY. A review on combating counterfeiting by empowering consumers via nfc enabled mobile computing leveraging on blockchain technology. [cited 2025 Jan 20]. Available from: https:\/\/ssrn.com\/abstract=5012178."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.foodres.2019.04.049","article-title":"Developing anti-counterfeiting measures: the role of smart packaging","volume":"123","author":"Soon","year":"2019","journal-title":"Food Res Int"},{"key":"ref16","series-title":"2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST); 2017","first-page":"61","article-title":"A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security","author":"Yang"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"16","DOI":"10.3390\/jsan9010016","article-title":"A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise","volume":"9","author":"Khalil","year":"2020","journal-title":"J Sens Actuator Netw"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3390\/jsan8030037","article-title":"A comparison survey study on RFID based anti-counterfeiting systems","volume":"8","author":"Khalil","year":"2019","journal-title":"J Sens Actuator Netw"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"e5232","DOI":"10.1002\/cpe.5232","article-title":"A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol","volume":"32","author":"Alzahrani","year":"2020","journal-title":"Concurr Comput Pract Exp"},{"key":"ref20","first-page":"633","article-title":"Study on the feasibility of smart-banknotes","volume":"23","author":"Sakazaki","year":"2015","journal-title":"J Inf Process"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1038\/s41528-020-0077-x","article-title":"A flexible ECG patch compatible with NFC RF communication","volume":"4","author":"Zulqarnain","year":"2020","journal-title":"npj Flexible Electronics"},{"key":"ref22","first-page":"857","article-title":"Integration of intention and resistance in adopting near field communication-based mobile payment innovation","volume":"9","author":"Pitari","year":"2020","journal-title":"Int J Sci Technol Res"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/JERM.2019.2929676","article-title":"Smart textile integrated wireless powered near field communication body temperature and sweat sensing system","volume":"4","author":"Jiang","year":"2019","journal-title":"IEEE J Electromagn RF and Microw Med Biol"},{"key":"ref24","first-page":"29","article-title":"Innovations in pharmaceutical packaging-an update","volume":"1","author":"Raja","year":"2012","journal-title":"Int J Adv Biomed Pharm Res"},{"key":"ref25","article-title":"A survey of counterfeit product detection","volume":"8","author":"Shankar","year":"2019","journal-title":"Int J Sci Technol Res"},{"key":"ref26","first-page":"446","article-title":"Materialism and luxury goods consumption fake","volume":"23","author":"da Silva PM","year":"2017","journal-title":"Rev Cienc Adm"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1080\/13669877.2020.1806908","article-title":"Protecting brands from counterfeiting risks: tactics of a total business solution","volume":"24","author":"Wilson","year":"2021","journal-title":"J Risk Res"},{"key":"ref28","series-title":"2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC)","first-page":"303","article-title":"Research on dual anti duplication and anti-counterfeiting technology of QR code based on metamerism characteristics","author":"Fangfang"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"852","DOI":"10.3390\/electronics9050852","article-title":"A blockchain and machine learning-based drug supply chain management and recommendation system for smart pharmaceutical industry","volume":"9","author":"Abbas","year":"2020","journal-title":"Electronics"},{"key":"ref30","article-title":"Survey of techniques for the fight against counterfeit goods and Intellectual Property Rights (IPR) infringement","author":"Baldini","year":"2015","journal-title":"JRC technical report"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"103504","DOI":"10.1016\/j.csi.2020.103504","article-title":"Commodity anti-counterfeiting decision in e-commerce trade based on machine learning and Internet of Things","volume":"76","author":"Chin","year":"2021","journal-title":"Comput Stand Interf"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2561","DOI":"10.1007\/s12205-020-0188-x","article-title":"A study on the application of blockchain technology in the construction industry","volume":"24","author":"Kim","year":"2020","journal-title":"KSCE J Civ Eng"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10796-020-10079-4","article-title":"Success and failure retrospectives of FinTech projects: a case study approach","volume":"25","author":"Jinasena","year":"2023","journal-title":"Inf Syst Front"},{"key":"ref34","first-page":"85","author":"Stake","year":"2022","journal-title":"International encyclopedia of education"},{"key":"ref35","series-title":"2020 IEEE International Conference on Blockchain (Blockchain)","first-page":"126","article-title":"Blockchain and off-chain: a solution for audit issues in supply chain systems","author":"L\u00f3pez-Pimentel","year":"2020"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3561386","article-title":"L2DART: a trust management system integrating blockchain and off-chain computation","volume":"23","author":"De Salve","year":"2023","journal-title":"ACM Trans Internet Technol"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"102535","DOI":"10.1016\/j.ipm.2021.102535","article-title":"hOCBS: a privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design","volume":"58","author":"Miyachi","year":"2021","journal-title":"Inf Process Manag"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jbusres.2021.05.032","article-title":"A double-edged sword: how the dual characteristics of face motivate and prevent counterfeit luxury consumption","volume":"134","author":"Shan","year":"2021","journal-title":"J Bus Res"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1007\/s00530-022-00910-0","article-title":"An improvement for PDF417 code authentication on mobile phone terminals based on code feature analysis and watermarking","volume":"28","author":"Li","year":"2022","journal-title":"Multimed Syst"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.3390\/fi13040086","article-title":"Toward blockchain-enabled supply chain anti-counterfeiting and traceability","volume":"13","author":"Yiu","year":"2021","journal-title":"Future Internet"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1109\/TMC.2019.2899093","article-title":"Offloading computations to mobile devices and cloudlets via an upgraded NFC communication protocol","volume":"19","author":"Chatzopoulos","year":"2019","journal-title":"IEEE Trans Mob Comput"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"2200","DOI":"10.1109\/ACCESS.2019.2962570","article-title":"Study on the reading of energy-harvested implanted NFC tags using mobile phones","volume":"8","author":"Lazaro","year":"2019","journal-title":"IEEE Access"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/IJOPM-12-2019-0781","article-title":"Designing blockchain systems to prevent counterfeiting in wine supply chains: a multiple-case study","volume":"41","author":"Danese","year":"2021","journal-title":"Int J Oper Prod Manag"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_61560\/TSP_CMC_61560.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:27:48Z","timestamp":1763342868000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/60992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061560","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}