O'Reilly logo
  • Mauricio Martinez thinks this is interesting:

Authentication consists of two acts: first, the act of providing proof of authenticity for the information that is being delivered or stored, and second, the act of verifying the proof of authenticity for the information that is being received or retrieved.

From

Cover of AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

Note

Authentication