Weaknesses of two RFID protocols regarding de-synchronization attacks | IEEE Conference Publication | IEEE Xplore