[HTML][HTML] Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
Coating objects with microscopic droplets of liquid crystals makes it possible to identify and
authenticate objects as if they had biometric-like features: this is extremely valuable as an …
authenticate objects as if they had biometric-like features: this is extremely valuable as an …
Verifying Artifact Authenticity with Unclonable Optical Tags
We study the challenge of authenticating objects. This problem is relevant when buyers
need proof that a purchase is authentic and not fake. Typically, manufacturers watermark …
need proof that a purchase is authentic and not fake. Typically, manufacturers watermark …