Fig. 4From: The computer for the 21st century: present security & privacy challengesPervasive IdM ChallengesBack to article page