Journal of Computer Networks and Communications / 2013 / Article / Figbox 4

Research Article

Untangling RFID Privacy Models

Box 4

(1) initializes the system and sends , and to .
(2) interacts with the whole system, limited by its class .
(3) analyzes the system without oracle queries.
(4) receives the hidden table of the DRAWTAG oracle.
(5) returns true or false.
succeeds if returns true.

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.