It is not the intent of this book to provide a detailed implementation of authentication functions. Nevertheless, the previous chapters provide the understanding of fundamental technologies behind authentication mechanisms. Also recall that authentication is a process that is used to confirm one’s identity and consists of three main methods, namely, something you know, something you have, and something you are.
In this final chapter, we give an overview of some of the current and future trends ...