From the reviews:
This book is worth reading. Clarke provides an architectural description with many tradeoffs that may help in building such a system. This book, with its clear focus on transparent authentication, brings together a lot of ideas and insights. (A. Marien, ACM Computing Reviews, March, 2012)
Part I: Enabling Security through User Authentication.- Current Use of User Authentication.- The Evolving Technological Landscape.- What is Really Being Achieved with User Authentication?- Part II: Authentication Approaches.- Intrusive Authentication Approaches.- Transparent Techniques.- Multibiometrics.- Biometric Standards.- Part III: System Design, Development and Implementation Considerations.- Theoretical Requirements of a Transparent Authentication System.- Implementation Considerations in Ubiquitous Networks.- Evolving Technology and the Future for Authentication.