Return to Article Details User Authentication in an Internet Protocol Download Download PDF