Identification and Authentication: Similarities and Differences