Counterfeit
Packaging
Authentication
Public key infrastructure
Cryptography
Counterfeit consumer goods
Forgery