Authentication method with impersonal token cards | IEEE Conference Publication | IEEE Xplore