From the reviews:
This book is worth reading. ... Clarke provides an architectural description with many tradeoffs that may help in building such a system. This book, with its clear focus on transparent authentication, brings together a lot of ideas and insights. (A. Marien, ACM Computing Reviews, March, 2012)
Part I: Enabling Security through User Authentication
Current Use of User Authentication
The Evolving Technological Landscape
What is Really Being Achieved with User Authentication?
Part II: Authentication Approaches
Intrusive Authentication Approaches
Transparent Techniques
Multibiometrics
Biometric Standards
Part III: System Design, Development and Implementation Considerations
Theoretical Requirements of a Transparent Authentication System
Implementation Considerations in Ubiquitous Networks
Evolving Technology and the Future for Authentication