Return to Article Details The development of an evaluation model for user authentication methods with security, usability, and usage frequency Download Download PDF