{"id":"https://openalex.org/W4409649362","doi":"https://doi.org/10.32604/cmc.2025.061560","title":"A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies","display_name":"A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409649362","doi":"https://doi.org/10.32604/cmc.2025.061560"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.061560","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061560","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.061560","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025624654","display_name":"Rajendren Subramaniam","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rajendren Subramaniam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018629387","display_name":"Saaidal Razalli Azzuhri","orcid":"https://orcid.org/0000-0001-8603-8840"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Saaidal Razalli Azzuhri","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082364037","display_name":"Teh Ying Wah","orcid":"https://orcid.org/0000-0002-3202-7035"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Teh Ying Wah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113785487","display_name":"Atif Mahmood","orcid":"https://orcid.org/0009-0008-0483-6557"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Atif Mahmood","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5041573811","display_name":"Vimala Balakrishnan","orcid":"https://orcid.org/0000-0002-6859-4488"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vimala Balakrishnan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025624654"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1176529,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"83","issue":"3","first_page":"4257","last_page":"4280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9399999976158142,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9746928215026855},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39363741874694824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3834023177623749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3600960373878479}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9746928215026855},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39363741874694824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3834023177623749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3600960373878479}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.061560","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061560","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.061560","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061560","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2912532032","https://openalex.org/W2921218302","https://openalex.org/W2942486452","https://openalex.org/W2953586042","https://openalex.org/W2963420992","https://openalex.org/W2982667531","https://openalex.org/W2996333612","https://openalex.org/W2998124838","https://openalex.org/W3019219013","https://openalex.org/W3026568256","https://openalex.org/W3042427263","https://openalex.org/W3044785208","https://openalex.org/W3049532292","https://openalex.org/W3093597118","https://openalex.org/W3112335681","https://openalex.org/W3129114628","https://openalex.org/W3133554244","https://openalex.org/W3145608601","https://openalex.org/W3163999550","https://openalex.org/W4220838168","https://openalex.org/W4288065119","https://openalex.org/W4296368437","https://openalex.org/W4319442229","https://openalex.org/W4376137885"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"Counterfeiting":[0],"is":[1,81,203],"still":[2],"a":[3,43,78,82,98,167,198,256,275],"pervasive":[4],"global":[5],"issue,":[6],"affecting":[7],"multiple":[8],"industries":[9],"and":[10,21,29,33,50,62,89,119,158,254,259,270,287],"hindering":[11],"industrial":[12],"innovation,":[13],"while":[14],"causing":[15],"substantial":[16],"financial":[17],"losses,":[18],"reputational":[19],"damage,":[20],"risks":[22],"to":[23,31,42,66,92,114,146,243],"consumer":[24,52,288],"safety.":[25],"From":[26],"luxury":[27],"goods":[28],"pharmaceuticals":[30],"electronics":[32],"automotive":[34],"parts,":[35],"counterfeit":[36,246],"products":[37,151,247],"infiltrate":[38],"supply":[39,162,250],"chains,":[40],"leading":[41],"loss":[44],"of":[45,150,200,226,268],"revenue":[46],"for":[47,85],"legitimate":[48],"businesses":[49,253],"undermining":[51],"trust.":[53,289],"Traditional":[54],"anti-counterfeiting":[55,101],"measures,":[56],"such":[57],"as":[58,69],"holograms,":[59],"serial":[60],"numbers,":[61],"barcodes,":[63],"have":[64],"proven":[65],"be":[67,192],"insufficient":[68],"counterfeiters":[70],"continuously":[71],"develop":[72],"more":[73,86,140,257],"sophisticated":[74],"replication":[75,138],"techniques.":[76],"As":[77],"result,":[79],"there":[80],"growing":[83],"need":[84],"advanced,":[87],"secure,":[88,118],"reliable":[90,260],"methods":[91],"prevent":[93],"counterfeiting.":[94],"This":[95,185],"paper":[96],"presents":[97],"novel,":[99],"holistic":[100],"platform":[102],"that":[103,180,187,202],"integrates":[104],"Near":[105],"Field":[106],"Communication":[107],"(NFC)-enabled":[108],"mobile":[109],"applications":[110],"with":[111,194],"blockchain":[112,269],"technology":[113,165,210],"provide":[115],"an":[116,176],"innovative,":[117],"consumer-friendly":[120],"authentication":[121,183,261],"mechanism.":[122],"Our":[123],"approach":[124],"addresses":[125],"key":[126],"gaps":[127],"in":[128,160,170,205,248,278],"existing":[129],"solutions":[130],"by":[131,174,213],"incorporating":[132],"dynamic":[133],"product":[134,182,188,220],"identifiers,":[135],"which":[136],"make":[137],"significantly":[139,244],"difficult.":[141],"The":[142,237],"system":[143],"enables":[144],"consumers":[145,255],"verify":[147],"the":[148,161,224,227,240,249,265,279],"authenticity":[149],"instantly":[152],"using":[153],"their":[154],"smartphones,":[155],"enhancing":[156],"transparency":[157],"trust":[159],"chain.":[163],"Blockchain":[164],"plays":[166],"crucial":[168],"role":[169],"our":[171],"proposed":[172,228],"solution":[173,273],"providing":[175],"immutable,":[177],"decentralized":[178],"ledger":[179],"records":[181,190],"data.":[184],"ensures":[186],"verification":[189],"cannot":[191],"tampered":[193],"or":[195],"altered,":[196],"adding":[197],"layer":[199],"security":[201,212],"absent":[204],"conventional":[206],"systems.":[207],"Additionally,":[208],"NFC":[209],"enhances":[211],"offering":[214,252],"unique":[215],"identification":[216],"capabilities,":[217],"enabling":[218],"real-time":[219],"verification.":[221],"To":[222],"validate":[223],"effectiveness":[225],"system,":[229],"real-world":[230],"testing":[231],"was":[232],"conducted":[233],"across":[234],"different":[235],"industries.":[236],"results":[238],"demonstrated":[239],"platform\u2019s":[241],"ability":[242],"reduce":[245],"chain,":[251],"robust":[258],"method.":[262],"By":[263],"leveraging":[264],"combined":[266],"strengths":[267],"NFC,":[271],"this":[272],"represents":[274],"significant":[276],"advancement":[277],"fight":[280],"against":[281],"counterfeiting,":[282],"ensuring":[283],"enhanced":[284],"security,":[285],"transparency,":[286]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
