Comparing Access-Control Technologies: A Study of Keys and Smartphones