Securing a remote terminal application with a mobile trusted device | IEEE Conference Publication | IEEE Xplore