Fig. 2From: Behavior-based user authentication on mobile devices in various usage contextsUser authentication procedure with proposed BehaviorID methodBack to article page