From 2G to 3G: a guide to mobile security | IET Conference Publication | IEEE Xplore