Security management against cloned cellular telephones | IEEE Conference Publication | IEEE Xplore