6th Workshop on Radio Frequency Identification Security, İstanbul, Turkey, 8 - 09 June 2010, vol.6370, pp.65
We review several privacy models for RFID schemes, depending on the capabilities of the adversary. Namely, an adversary may access to the information about whether the identification succeeded or not. He may be able to corrupt tags or not. As for corruption, we may be interested in privacy of information prior to corruption or not. We review formal definition and discuss latest results about the stronger notion of privacy.