Analyzing the security techniques used in LTE Advanced and their evaluation | IEEE Conference Publication | IEEE Xplore