Return to Article Details Privacy-Preserving and Scalable Authentication based on Network Connection Traces Download Download PDF