Adopted-Repeatedly


Description

The authentication scheme is not only implemented by the author or owner but also from independent and other parties. The Sub-feature is also given if an open-source project of the scheme exists and thus the evaluation and implementation by third parties are possible.