"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation

We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a ...