Authentication techniques utilizing a computing device