Utility vs. Security Tokens: Why Not Both?