Return to Article Details Evolution of User Authentication Methods in Mobile Phones: A Security Perspective Download Download PDF