Identification
Fingerprints
Biometrics
Two-factor authentication
Authentication
Password
Security
Access control
Cryptography