The report comprises two papers in which we analyze all existing methods of authentication used in ATMs and those expected to be used in the near future,

Sourced through Scoop.it from: securelist.com