Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Figure 1

Ways to authenticate humans.