... architecture, in order to reduce its dimension and final cost. Designing and Deploying RFID Applications 234 information on the tags will be the ID, random number and the timestamp. Next, the reader ... conference on RFID, 2008 (pp. 58- 64). Garfinkel, S., Juels, A., and Pappu, R. (2005). RFID Privacy: An Overview of Problems and Proposed Solutions.IEEE Security and Privacy, 3( 3):pp 34 – 43, May–June ... http://www.australianit.news.com.au/story/0.24897,2 135 56 53- I5841,00.html. Designing and Deploying RFID Applications 244 In practice, exact costs are rarely known and could change as we learn more about...