Guide to Understanding Identification and Authentication in Trusted Systems by James Anderson | Lex | Lex