Evolving Technology and the Future for Authentication

  • Nathan Clarke


The need for changes in the way authentication is performed has been clearly identified in the early chapters. Indeed the purpose of this text is to provide a different perspective on the problem – moving away from the traditional point-of-entry Boolean decision to a continuous identity confidence. The Transparent Authentication System (TAS) seeks to harness all authentication approaches and provide a level of flexibility to enable compatibility and acceptance from all aspects of society, the young, old, professional, unskilled and security-indifferent individual. However, this approach is far from being a panacea for the authentication problem.


Mobile Phone Intrusion Detection System Biometric System False Acceptance Rate Identity Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Apple: Apple reports first quarter results. Apple Corporation. Available at: (2011). Accessed 10 Apr 2011
  2. BBC: Internet access is a fundamental human right. BBC News. Available at: (2010). Accessed 10 Apr 2011
  3. Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in NIST 1998 Speaker recognition evaluation. In: Proceedings of the 5th International Conference on Spoken Language Processing (ICSLP), Sydney, Australia (1998)Google Scholar
  4. Hocking, C., Furnell, S.M., Clarke, N.L., Reynolds, P.: A distributed and cooperative user authentication framework. In: Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010), Atlanta (2010)Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Centre for Security, Communications & Network Research (CSCAN)Plymouth UniversityPlymouthUK

Personalised recommendations