A New Strong Adversary Model for RFID Authentication Protocols
Radio Frequency Identification (RFID) systems represent a key technology for ubiquitous computing and for the deployment of the Internet Flags of Things (IoT).In RFID technology, authentication protocols are often necessary in order to confirm the identity of the parties involved (i.e.RFID readers, RFID tags and/or database servers).In this article