Which of the following are methods used for authentication?