Modifying authentication techniques in mobile communication systems | IEEE Conference Publication | IEEE Xplore