Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 6

OSK protocol.