Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 5

Formalization of the adversary.