Footnote 1:

Similarly, one might have passwords that depend on the time at which they are used, or other time-dependent security measures like those described here.

Press the back button on your browser to go back to the post