Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Figure 2

(a) PIN, (b) graphical pattern, and (c) password.
(a)
(b)
(c)