Fig. 4From: Application of chaotic encryption algorithm based on variable parameters in RFID securityStructural model of the improved algorithmBack to article page