A hierarchy of authentication specifications | IEEE Conference Publication | IEEE Xplore