Return to Article Details Identification and authentication - methods of protection from unauthorized access Download Download PDF