You are about to access our book library "Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise full version" .