Authentication of mobile users | IEEE Journals & Magazine | IEEE Xplore