A model for secure mobile computing | IEEE Conference Publication | IEEE Xplore