Research Article

Inductive Method for Evaluating RFID Security Protocols

Figure 7

VOSK protocol.