Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 4

The formalized model of the reader.