Name:augmented authentication devices time or use variant
Something you have or can do is used
to augment normal authentication, typically by a time or use variation in the
authentication string. Examples include the Secure-ID authentication device
and similar cards, algorithmic authentication, and challenge-response
cards.
Complexity: Despite several potential vulnerabilities associated
with these devices, they are basically encryption devices used for
authentication and the complexity issues are similar to those involved in
other areas of cryptography.
fc@red.a.net