A Comparison of Three Authentication Properties