Topics Related to Authentication, Examples and Mining: