B. Attack on Traceability of the Tag The authors claim that the old owner is not be able to trace the tag after an successful ownership protocol. However, we show that the privacy of the tag can be elaborated by the old owner as follows.
B. Attack on Traceability of the TagThe authors claim that the old owner is not be able to tracethe tag after an successful ownership protocol. However, weshow that the privacy of the tag can be elaborated by the oldowner as follows.