Review Article
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
Table 1
Synopsis of knowledge-based schemes.
| Modalities | Authentication types | Usability pros and cons indicated | Security solutions or concerns reported |
| PIN [57, 60, 62]; password [53, 60]; pattern [60, 64] | One-shot; static; periodic; single sign-on; unimodal | [48, 52ā57, 60, 62, 71, 72] | [58, 61ā70] |
|
|