Review Article
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
Table 2
Synopsis of token-based schemes.
| Modalities | Authentication types | Usability pros and cons indicated | Security solutions or concerns reported |
| OTP [75]; device pairing [77, 79] | Multifactor; adaptive; dynamic; risk-based | [40, 79, 80ā82] | [73ā78] |
|
|