RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications