Figure 1

« 
Previous
|
|
Next
 »

Figure 1: Selecting an authenticator on the smartphone.