On the Complexity of Attacking Commercial Authentication Products | IEEE Conference Publication | IEEE Xplore