Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Figure 5

Factors of authentication [27].