Research Article

Untangling RFID Privacy Models

Figure 5

PK-based authentication protocol.
710275.fig.005