Modelling User Devices in Security Ceremonies | IEEE Conference Publication | IEEE Xplore