Abstract
Authentication is one of the issues at the heart of machine security, and there is a great array of authentication types. To begin with, one can classify authentication methods based on who is authenticating to whom, creating a breakdown into machine-to-machine authentication, machine-to-human authentication, human-to-human authentication, and human-to-machine authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Jakobsson, M. (2013). The Big Picture. In: Mobile Authentication. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4878-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-4878-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-4877-8
Online ISBN: 978-1-4614-4878-5
eBook Packages: Computer ScienceComputer Science (R0)