Resilient-to-Theft


Description

Physical objects used for authentication in the scheme cannot be used by another person than the legitimate user if it gets lost or stolen.