Research Article
Untangling RFID Privacy Models
Experiment | (1) initializes the system and sends , and to . | (2) interacts with the whole system, limited by its class . | (3) analyzes the system without oracle queries. | (4) receives the hidden table of the DRAWTAG oracle. | (5) returns true or false. | succeeds if returns true. |
|