Two Methods for Authentication Using Variable Transmission Power Patterns | IEEE Conference Publication | IEEE Xplore