Security Intensification in Restricted Area By Confining Unauthorized Smart Phone Applications | IEEE Conference Publication | IEEE Xplore