Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 3

The electronic tag model.