Comparative evaluation of Security Keys to similar schemes

Table showing Comparative evaluation of Security Keys to similar schemes based on Google research paper.