Authentication is one of the issues at the heart of machine security, and there is a great array of authentication types. To begin with, one can classify authentication methods based on who is authenticating to whom, creating a breakdown into machine-to-machine authentication, machine-to-human authentication, human-to-human authentication, and human-to-machine authentication.
CITATION STYLE
Jakobsson, M. (2013). The Big Picture. In SpringerBriefs in Computer Science (Vol. 0, pp. 1–3). Springer. https://doi.org/10.1007/978-1-4614-4878-5_1
Mendeley helps you to discover research relevant for your work.