Research Article

Untangling RFID Privacy Models

Figure 2

One round of the tree-based authentication protocol.
710275.fig.002