Return to Article Details A SURVEY AND COMPARISON ON USER AUTHENTICATION METHODS Download Download PDF