Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
+
Journal Menu
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Submit
Mobile Information Systems
/
2018
/
Article
/
Tab 2
Review Article
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
Table 2
Synopsis of token-based schemes.
Modalities
Authentication types
Usability pros and cons indicated
Security solutions or concerns reported
OTP [
75
]; device pairing [
77
,
79
]
Multifactor; adaptive; dynamic; risk-based
[
40
,
79
,
80
–
82
]
[
73
–
78
]