Evaluating the validity of music as an authentication key | IEEE Conference Publication | IEEE Xplore