Research Article

Untangling RFID Privacy Models

Figure 1

SK-based authentication protocol.
710275.fig.001