Abstract
Authentication is one of the issues at the heart of machine security, and there is a great array of authentication types. To begin with, one can classify authentication methods based on who is authenticating to whom, creating a breakdown into machine-to-machine authentication, machine-to-human authentication, human-to-human authentication, and human-to-machine authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Jakobsson, M. (2013). The Big Picture. In: Mobile Authentication. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4878-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-4878-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-4877-8
Online ISBN: 978-1-4614-4878-5
eBook Packages: Computer ScienceComputer Science (R0)