Journal of Computer Networks and Communications / 2013 / Article / Figbox 1

Research Article

Untangling RFID Privacy Models

Box 1

Experiment .
(1) initializes the system .
(2) requests to receive a tag .
(3) chooses , queries Oracle where , and then receives .
(4) requests to receive two challenge tags and , such that or .
(5) chooses and such that , , and .
(6) queries Oracle and Oracle , and then receives and .
(7) decides which of or is , and outputs a guess bit .
succeeds if .

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.