Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 1

The RFID system.