© The Author(s), under exclusive license to APress Media, LLC , part of Springer Nature 2021
S. BoonkrongAuthentication and Access Controlhttps://doi.org/10.1007/978-1-4842-6570-3_8

8. Current and Future Trends

Sirapat Boonkrong1  
(1)
Nakhon Ratchasima, Thailand
 

It is not the intent of this book to provide a detailed implementation of authentication functions. Nevertheless, the previous chapters provide the understanding of fundamental technologies behind authentication mechanisms. Also recall that authentication is a process that is used to confirm one’s identity and consists of three main methods, namely, something you know, something you have, and something you are.

In this final chapter, we give an overview of some of the current and future trends ...

Get Authentication and Access Control: Practical Cryptography Methods and Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.