Author:Tsague, HD; Nelwamondo, Fulufhelo V; Msimang, NDate:Nov 2012One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core ...Read more