-
1
-
2
-
3
-
4
-
5
-
6
-
7
Hardware and protocols for authentication and secure computation
Published 2018Get full text
Thesis -
8
Assessing the filtration efficiency and regulatory status of N95s and nontraditional filtering face-piece respirators available during the COVID-19 pandemic
Published 2021“…Many are not correctly labelled and do not perform to accepted standards and a subset are obviously dangerous; many of these masks are likely to be counterfeit. Due to the absence of publicly available information on mask suppliers and inconsistent labeling of KN95 masks, it is difficult to distinguish between legitimate and counterfeit products. …”
Get full text
Article -
9
-
10
-
11
-
12
Optical Detection of Degraded Therapeutic Proteins
Published 2018“…Identifying malformed proteins at the point-of-care can prevent adverse immune reactions in patients; this is of special concern when there is an insecure supply chain resulting in the delivery of degraded, or even counterfeit, drug product. Identification of degraded protein, for example human growth hormone, is demonstrated by applying automated anomaly detection algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Food and liquid sensing in practical environments using RFIDs
Published 2021“…We built a prototype of RF-EATS and tested it in seven different applications including identifying fake medicine, adulterated baby formula, and counterfeit beauty products. Our results demonstrate that RF-EATS can achieve over 90% classification accuracy in scenarios where state-of-the-art RFID sensing systems cannot perform better than a random guess.…”
Get full text
Article -
14
CMOS THz-ID: A 1.6mm² Package-Less Identification Tag Using 260-GHz Far-Field Backscatter Communication
Published 2022“…Radio Frequency Identification (RFID) tags have been widely used for counterfeit mitigation, authentication and supply chain management. …”
Get full text
Get full text
Thesis -
15
-
16
Quantum Copy-Protection and Quantum Money
Published 2010“…Forty years ago, Wiesner proposed using quantum states to create money that is physically impossible to counterfeit, something that cannot be done in the classical world. …”
Get full text
Get full text
Article -
17
-
18
Circuits for efficient and secure power delivery in distributed applications
Published 2017Get full text
Thesis -
19
-
20
Benjamin Franklin's Greatest Invention
Published 2012“…In January 1776, in the first use of counterfeiting as a weapon of war, the British set up a printing press aboard the Royal Navy's HMS Phoenix, anchored in New York Harbor. …”
Get full text
Get full text
Article