A security analysis of smartphone data flow and feasible solutions for lawful interception | IEEE Conference Publication | IEEE Xplore