Mobile Information Systems / 2018 / Article / Tab 2

Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Table 2

Synopsis of token-based schemes.

ModalitiesAuthentication typesUsability pros and cons indicatedSecurity solutions or concerns reported

OTP [75]; device pairing [77, 79]Multifactor; adaptive; dynamic; risk-based[40, 79, 8082][7378]