Journals
Publish with us
Publishing partnerships
About us
Blog
Journal of Computer Networks and Communications
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Journal of Computer Networks and Communications
/
2013
/
Article
/
Tab 1
/
Research Article
Untangling RFID Privacy Models
Table 1
Analysis summary of the protocols. “
✗
” means no privacy. For the PK-based protocol, a property followed by “*” means that it is at least achieved with
-security. For the sake of clarity, we denote “
” and “
” as being, respectively, “
” and “
.”
Model
Protocol
SK based [
37
]
Tree based [
8
]
OSK based [
22
]
O FRAP [
18
]
PK based [
22
]
Avoine
RTE
RTE
RTE
RTE
RTE*
RTEC
RTEC
RTEC*
JW
-privacy
✗
✗
-privacy
-privacy
Vaudenay
privacy
privacy
privacy
privacy
privacy*
privacy
LBM
✗
✗
✗
security
security
DMR
Untraceability
✗
Untraceability
Untraceability
Untraceability*
CCEG
untraceability
untraceability
✗
untraceability
untraceability
DLYZ
privacy
✗
✗
privacy
privacy
HPVP
privacy
privacy
privacy
privacy
privacy*
privacy