New threat models on authentication: Difference between revisions