“…The table shows the title of article, layer(s) of authentication applied, authors and, subject of the study. Of the 28 articles reviewed, 20 were about biometric authentication [18 -21], [23 -33], [35], [37], [40], [42], [44]. There were 17 studies about textual password authentication [17], [21], [23], [25 -27], [30], [32 -38], [41 -43] and three studies about graphical password authentication [22], [34], [39].…”