Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
+
Journal Menu
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Submit
Mobile Information Systems
/
2018
/
Article
/
Tab 5
Review Article
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
Table 5
Synopsis of behavioral biometrics.
Modalities
Authentication types
Usability pros and cons indicated
Security solutions or concerns reported
Touch [
9
,
113
]; keystroke [
115
]; hold [
8
]; gait [
116
–
118
]; behavior profiling [
119
]
Adaptive; continuous; multimodal; risk-based; transparent
[
3
,
5
,
10
,
113
,
119
–
121
]
[
8
,
12
,
29
,
112
,
113
,
115
–
117
,
122
–
127
]