An efficient authentication technique for security management against cloning mobile phones | IEEE Conference Publication | IEEE Xplore