Fig. 7From: Abstract security patterns and the design of secure systemsClass model of the password-based authenticatorBack to article page