Return to Article Details Efficient Authentication Using Fine-grained Approach over Mobile and Pervasive Computing Download Download PDF