Skip to main content

The Big Picture

  • Chapter
  • First Online:
Mobile Authentication

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 1218 Accesses

Abstract

Authentication is one of the issues at the heart of machine security, and there is a great array of authentication types. To begin with, one can classify authentication methods based on who is authenticating to whom, creating a breakdown into machine-to-machine authentication, machine-to-human authentication, human-to-human authentication, and human-to-machine authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Markus Jakobsson .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Jakobsson, M. (2013). The Big Picture. In: Mobile Authentication. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4878-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4878-5_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4877-8

  • Online ISBN: 978-1-4614-4878-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics