... 14443-3 and ISO/IEC 7816-6 AMD.1. The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags 281 locks of locking bits, of which each bit handles pages 10~ 15, pages 4~9 and ... Springer, 2005. Development and Implementation of RFID Technology 288 [4] L. Bolotnyy, and G. Robins, “Generalized yoking-proofs for a group of RFID tags”, in Proc. of MOBIQUITOUS 2006, ... ‘yoking-proofs’ for a group of RFID tags”, In MOBIQUITOUS 2006, 2006. Development and Implementation of RFID Technology 276 one simple example. In the example, tag T1 owns the key K1 and K3, and...