Authenticating Pervasive Devices with Human Protocols Authenticating Edges Produced by Zero-Crossing Algorithms Authenticating mobile phone users using keystroke analysis S.A.: Authenticating pervasive devices with human protocols Authenticating streamed data in the presence of random packet loss Method and apparatus for authenticating users Authenticating Streamed Data in the Presence of Random Packet Loss (Extended Abstract) Semifragile watermarking for authenticating JPEG visual content An efficient scheme for authenticating public keys in sensor networks Computerized system for making payments and authenticating transactions over the internet