All user identification and authentication methods require some amount of security administration. Which authentication techniques require additional work in administering the security?
a. Cryptography
b. Smart tokens
c. Passwords
d. Memory tokens