Authentication Methods
Reusable Passwords
Many vulnerabilities, e.g. sharing, guessing, eavesdropping, replay attacks
One-time Passwords
A different password with every login
Previous slide
Next slide
Back to first slide
View graphic version