The area of authentication that we are interested in can be divided into these categories: - [x] user-to-machine, - [x] machine-to-user, - [ ] machine-to-machine (#22), - [ ] user-to-user (through machine).
The area of authentication that we are interested in can be divided into these categories: