Location-based authentication technique can be effectively used to provide which of the following?
a. Static authentication
b. Intermittent authentication
c. Continuous authentication
d. Robust authentication