Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2018
/
Article
/
Fig 4
/
Review Article
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
Figure 4
(a) Fingerprint, (b) face, (c) iris, (d) voice, (e) gait, (f) swipe, and (g) touch.