Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Table 2

Synopsis of token-based schemes.

ModalitiesAuthentication typesUsability pros and cons indicatedSecurity solutions or concerns reported

OTP [75]; device pairing [77, 79]Multifactor; adaptive; dynamic; risk-based[40, 79, 80ā€“82][73ā€“78]