Ranking Authentication Methods (and Choosing the Right One)