Return to Article Details Research and modeling of authentication process using functioning table Download Download PDF