(1) (2) (3)
a) Authentication based
on one’s possession
Authentication based on
physical characteristics
Authentication based on
knowledge
b) Authentication based
on one’s possession
Authentication based on
knowledge
Authentication based on
physical characteristics
c) Authentication based
on knowledge
Authentication based on
one’s possession
Authentication based on
physical characteristics
d) Authentication based
on knowledge
Authentication based on
physical characteristics
Authentication based on
one’s possession