Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access