Journal of Computer Networks and Communications / 2013 / Article / Figbox 6

Research Article

Untangling RFID Privacy Models

Box 6

Experiment
(1) initializes the system and sends , 's public parameters (including ) to .
(2) interacts with the whole system, limited by its class .
(3) returns one link .
succeeds if is a NOL.

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.