A study on cell phone security: Authentication techniques | IEEE Conference Publication | IEEE Xplore