Research Article
Untangling RFID Privacy Models
Algorithm 1
The search procedure.
Input: | Output: | (1) | (2) if (, ,) s.t. (resp. ) then | (3) (resp. ) | (4) if then | (5) is correctly authenticated | (6) | (7) () | (8) end if | (9) end if | (10) for all (, ,) and do | (11) | (12) if then | (13) is correctly authenticated | (14) | (15) () | (16) end if | (17) end for | (18) return |
|