Exploring new authentication protocols for sensitive data protection on smartphones