{"id":"https://openalex.org/W2979963617","doi":"https://doi.org/10.1109/ccece.2019.8861955","title":"Smart Phone Anti-counterfeiting System Using a Decentralized Identity Management Framework","display_name":"Smart Phone Anti-counterfeiting System Using a Decentralized Identity Management Framework","publication_year":2019,"publication_date":"2019-05-05","ids":{"openalex":"https://openalex.org/W2979963617","doi":"https://doi.org/10.1109/ccece.2019.8861955","mag":"2979963617"},"language":"en","primary_location":{"id":"doi:10.1109/ccece.2019.8861955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2019.8861955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073500309","display_name":"Ahmad Sghaier Omar","orcid":"https://orcid.org/0000-0002-7896-9255"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ahmad Sghaier Omar","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031048152","display_name":"Otman Basir","orcid":"https://orcid.org/0000-0002-6454-0538"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Otman Basir","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073500309"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":3.0524,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.92952187,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7097557783126831},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.6855798959732056},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.5949950814247131},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5768399834632874},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5143541097640991},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4981496334075928},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.48535314202308655},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.44703590869903564},{"id":"https://openalex.org/keywords/ledger","display_name":"Ledger","score":0.43529918789863586},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4288044273853302},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4228835105895996},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3879215121269226},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37140464782714844},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.32263123989105225},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.24667224287986755},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1693386435508728}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7097557783126831},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.6855798959732056},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.5949950814247131},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5768399834632874},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5143541097640991},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4981496334075928},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.48535314202308655},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.44703590869903564},{"id":"https://openalex.org/C91302708","wikidata":"https://www.wikidata.org/wiki/Q2732056","display_name":"Ledger","level":2,"score":0.43529918789863586},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4288044273853302},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4228835105895996},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3879215121269226},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37140464782714844},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.32263123989105225},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.24667224287986755},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1693386435508728},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccece.2019.8861955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2019.8861955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2054702684","https://openalex.org/W2948254976","https://openalex.org/W3151748982","https://openalex.org/W4249545562"],"related_works":["https://openalex.org/W1517747134","https://openalex.org/W2802479602","https://openalex.org/W4386576376","https://openalex.org/W4378965685","https://openalex.org/W4385626451","https://openalex.org/W4378218521","https://openalex.org/W3098279793","https://openalex.org/W1968554315","https://openalex.org/W2481126171","https://openalex.org/W2295826008"],"abstract_inverted_index":{"The":[0,26,45,253],"effect":[1,248],"of":[2,23,47,58,81,85,164,181,199,225,230,236,241,260,262],"counterfeiting":[3],"on":[4,52,266],"smart":[5,59,120,182,263],"phone":[6,28,60,183],"sales":[7],"worldwide":[8],"is":[9,51,72,102,158,255],"estimated":[10],"at":[11,16],"184":[12],"million":[13],"units,":[14],"valued":[15],"45.3":[17],"billion":[18,68,77],"EUR":[19],"or":[20],"12.9":[21],"%":[22],"total":[24],"sales.":[25],"mobile":[27,92],"counterfeiting,":[29],"in":[30,63,111,119,187,249],"addition":[31,112],"to":[32,90,113,127,153,161,177,205],"its":[33],"economic":[34],"impact,":[35],"has":[36,65,73],"serious":[37],"security,":[38],"privacy,":[39],"and":[40,70,98,109,169,190,221,228,238,243],"even":[41],"general":[42],"safety":[43],"concerns.":[44],"proliferation":[46],"Smart":[48,210],"Phones":[49],"devices":[50,61,69,78,87,245],"the":[53,56,96,99,115,125,131,179,197,215,223,234,250],"rise,":[54],"where":[55],"number":[57],"shipped":[62],"2017":[64],"surpassed":[66],"1.5":[67],"it":[71],"reached":[74],"around":[75,95],"1.2":[76],"by":[79],"end":[80],"Q3":[82],"2018.":[83],"Most":[84],"those":[86,104],"are":[88,107],"attached":[89],"different":[91],"networks":[93],"operated":[94],"globe,":[97],"challenges":[100],"arising":[101],"how":[103,114],"devices'":[105],"identities":[106],"maintained":[108],"verified":[110],"supply":[116],"chain":[117],"actors":[118],"phones":[121],"industry":[122],"can":[123],"ensure":[124],"access":[126],"device":[128,132],"identity":[129,184,202,226],"throughout":[130],"life":[133],"cycle":[134],"with":[135,233],"less":[136],"control":[137],"from":[138],"third":[139],"parties.":[140],"Blockchain":[141],"as":[142,149],"a":[143,150,175,188,196,200,207,218,258,267],"distributed":[144],"ledger":[145],"technology":[146],"positions":[147],"itself":[148],"suitable":[151],"candidate":[152],"address":[154],"this":[155],"challenge.":[156],"That":[157],"mainly":[159],"attributed":[160],"Blockchain's":[162],"use":[163,198],"cryptographic":[165],"identifiers,":[166],"records":[167],"immutability,":[168],"provenance.":[170],"These":[171],"features,":[172],"together,":[173],"provide":[174],"platform":[176],"implement":[178,206],"functions":[180,186],"management":[185,203],"global":[189],"decentralized":[191,201],"environment.":[192],"This":[193],"paper":[194],"presents":[195],"framework":[204],"system":[208],"for":[209,217],"Phone":[211],"Anti-Counterfeiting":[212],"that":[213,246],"eliminates":[214],"need":[216],"central":[219],"authority":[220],"provides":[222],"features":[224],"creation":[227],"transfer":[229],"ownership,":[231],"along":[232],"capability":[235],"fast":[237],"secure":[239],"reporting":[240],"stolen":[242],"lost":[244],"takes":[247],"shortest":[251],"time.":[252],"work":[254],"implemented":[256],"using":[257],"set":[259],"solidity":[261],"contracts":[264],"deployed":[265],"private":[268],"Ethereum":[269],"Blockchain.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
