Authentication in ubiquitous computing