Cryptanalysis of the end-to--end security for mobile communications with end-user identification/authentication | IEEE Journals & Magazine | IEEE Xplore