Two facets of authentication | IEEE Conference Publication | IEEE Xplore