Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Figure 7

Continuous authentication process [29].