Research Article

Untangling RFID Privacy Models

Algorithm 1

The search procedure.
Input:
Output:
(1)
(2) if   ( , , ) s.t. (resp. ) then
(3)       (resp. )
(4)      if   then
(5)          is correctly authenticated
(6)         
(7)          ( )
(8)      end if
(9) end if
(10) for all ( , , )   and   do
(11)      
(12)       if     then
(13)           is correctly authenticated
(14)          
(15)           ( )
(16)      end if
(17) end for
(18) return