To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape | IEEE Conference Publication | IEEE Xplore