Figure 1From: Understanding user perceptions of transparent authentication on a mobile device Interplay between the tasks, their security levels, the confidence level of the device and the confidence level of the authentication mechanism. Back to article page