Review Article
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
Table 14
Notations used in GNY logic analysis.
| S.No. | Statement/Notations | Interpretation |
| 1 | | Manager/Administrator |
| 2 | | Message/variable |
| 3 | | Reader |
| 4 | | Tag |
| 5 | | Intermediate Step |
| 6 | | is informed , didn’t convey in current session |
| 7 | | is informed |
| 8 | | Concatenation of |
| 9 | | believes that is fresh |
| 10 | | believes that is computable/recognizable |
| 11 | | believes that holds |
| 12 | | believes that is an appropriate secret for |
| 13 | | can possess |
| 14 | | once conveyed |
| 15 | | is encrypted using symmetric key |
|
|