Securing mobile users (Paper unavailable) | IET Conference Publication | IEEE Xplore